

buy a stock through a company like Fidelity where is the stock actually held and that was layers of public/private companies/corporations
buy a stock through a company like Fidelity where is the stock actually held and that was layers of public/private companies/corporations
How about some Yubikeys or smart cards instead of something that requires me to scan my retina and share it with Sam Altman
Autonomous vehicles often have network connectivity to allow the owner to track, monitor, and send commands.
WiFi is on all three bands. It’s not so much what’s newer vs older. Newer devices tend to support 2.4, 5, and 6 and switch between them based on quality of signal and support by the WiFi network. Higher frequencies like 5 and 6GHz are generally better because there’s less interference.
Cheaper devices tend to only support 2.4GHz
Yes, but from a societal perspective, theres value in making cuts in a lot of different places.
Maybe you can do a meatless Monday, and somebody else will go vegan. Tell the people in private jets to stop flying private, but the family that’s going to another culture and learning and maybe becoming better has benefits.
Fascinating. Just based on your comment and nothing else, sounds like it could be something like a CPU Enclave like Intel SGX. Basically a remote client can validate that an application runs in a secure part of a remote cloud computer. The stated goal of SGX is that you only have to trust Intel and if you trust Intel and say run program X in the enclave, then only that part of the CPU can access the data, not the applications running in the non-secure enclave.
Now that brushes over some things like you still need to trust the client and IIRC in a WhatsApp situation, you don’t really know what enclave does, but the communications between the enclave and the host OS are heavily restricted. LLMs also require lots of CPU and are usually run on GPUs, so not sure how that works yet.
I think #1 is suggesting to move the neutral over to another hot phase and change the outlet to a 240v nema 6/three prong (I think) with two hots and a ground instead of the 4 prong.
The 240v at the same amps gives you higher watts so faster charging without an expensive new conductor. I’m
Google is doing this because they have incentives to do so. They want to block malicious actors like attack their platforms.
Other companies want to lock down their own apps because they don’t think users should be permitted to do anything other than use their apps exactly as they want.
I don’t like it as a user, but I also see the reason why companies want this by being on the security side of software.
This is the future of the Big Tech Internet if we’re not careful. Attestation to be able to use communications and other websites.
I used to work in Amazon (left after 10 years because it wore me down), but it wasn’t that compartmentalized.
I’m sure there were some teams that were like that but I could easily find another team, open a ticket, get a response and see their on calls investigate the issue. It was often times possible to look at their service metrics and source code to see if I could find the problem myself.
Support just can’t share that info because they don’t know what is considered a trade secret or internal detail vs what is public.
Is it different than how a country would protect other infrastructure like government buildings, hospitals, other electrical grid infrastructure, dams, etc.?
Different Operating Systems call it different things. Windows calls it Alternate. Even if it was only used when the primary was down, DNS doesn’t provide any sort of guidance or standard on when to switch between primary and secondary. Is one query timeout enough to switch? How often do you reattempt to the first DNS server? When do you switch back? With individual queries, you can timeout and hit another NS server, but that’s a lot easier at an individual level than to infer a global system state from one query timing out.
And what do you set that secondary DNS entry to? Operating systems may use both, so you need the secondary to point to a pi hole or else you’re letting ads through randomly.
Past vulnerabilities doesn’t mean there is active mpdern vulnerabilities especially ones in widely tested operating systems that’s exploited by as many apps as people claim are listening when security researchers also regularly reverse engineer and analyze the source code of popular apps to figure out what they’re doing. You can decompile Android apps pretty easily to see what they’re doing. Some are obfuscated so it takes some effort.
Its one thing to claim there’s some a system level bypass for the icon that the NSA uses to spy on its enemies, it’s another thing to claim that it’s being exploited on a wide scale by a tech companies on different apps, iOS and Android, multiple versions/devices.
The reality is that we leak tons of info through other mediums that are easier and cheaper to collect than through microphones.
Here’s a good reason why you should run an ad blocker. Block the Google Analytics script from loading entirely.
Google Analytics gives you insights on what pages people visit, how long they spend, what kind of browsers and devices they use. That can give them data on what pages are important to customers and what screen sizes to support
I’d rather they self host this data vs use Google Analytics, but there are benefits.
They started charging money for Docker Desktop for companies and they have been adding pull limits on Docker Hub.
Personally, I’ve been enjoying cozy games like Dorfromantik, Rail Route, or even Transport Fever 2 (I just play with unlimited money and build great transit networks that I wish existed in my home country.)
The laptops are manufactured in Taiwan. There’s so much unpredictability in the tariffs so they’re delaying until it settles down. Tariffs are going to impact US companies and US residents.
The problem is the payment processor. There’s only so many of them that customers actually choose to use.