

They used 3 mini PCs with SSDs, which all of them were completely smashed and unrecoverable. the flash chips were all cracked or missing.
They used 3 mini PCs with SSDs, which all of them were completely smashed and unrecoverable. the flash chips were all cracked or missing.
The SD card was from inside a titanium cased underwater camera that was mounted outside the hull. It wasn’t actually in the implosion, it just survived the shockwave (which was probably 1000s of Gs, so still impressive)
Yeah, I’d expect this to be similar latency and accuracy. Lighthouse can do full 6dof tracking at a room scale too, not just sitting head tracking for a seated position like it seems opentrack does
The user does have to log in again to access the second TTY. I don’t know exactly what Hyprland’s settings do, but “allow_session_lock_restore” doesn’t sound like something you want turning on randomly while an attacker is sitting trying to access your computer. It’s very possible the crash itself was caused intentionally by the attacker in that case.
Edit: Nevermind “allow_session_lock_restore” is just for saving open windows and stuff, so not really an issue. Restarting the lock screen however is very much not something you want to do while trying to keep an attacker out of your computer.
These steps require logging in again. I don’t think it’s secure to have it automatically try and fix the lock screen, since it just introduces more ways to potentially bypass it.
I don’t know how it went down, but I’m pretty sure they didn’t have to give the Sheriff anything. He’d have time to go over the subpoena with a lawyer the same as if it was just mailed. It doesn’t sound like there was any warrant for the Sheriff to perform a search or do anything other than drop off the papers.
What does any of this have to do with the government forcing backdoors into otherwise encrypted chats? The point is that nobody but the recipient should be able to read it, not even governments.
the CEO of Kurzgesagt word that they would not have made the videos if they hadn’t been paid to
This on its own proves nothing bad. Some videos just require a bigger budget to make and can’t be made on their otherwise limited budget. Or the topic is just lower priority due to writer interests. If they were forced into covering specific topics then that’s a different story, but I haven’t seen any evidence that was the case.
Sounds like a good way to AI-wash any accounting fraud. Now you can just blame it on Microsoft.
A famously useful tool for saving miners from suffocation?
I’m pretty sure Hindenburg would have been able to land somewhere instead of crashing out of the air if it used Helium. The surface catching fire wouldn’t spread nearly as quickly as the cells exploding with hydrogen gas. I’m not sure what material the cells were made out of, but I doubt it burns like flash paper.
$60k a year is not enough to live comfortably in most of the cities with tech hubs. Rent alone would be 60+% of your paycheck, plus utilities and a car to get to work, you might be going hungry.
All the terrible touch features they’re adding to cars these days makes me think a brand new car today would go obsolete before a 10 year old used car with 100k miles. New cars are unrepairable because of how complicated they are.
Even the $3000 Samsung TVs have ads if you connect them to the Internet. Noone is safe
I’ve got a 9700X and it absolutely rips at only 65W
The trusted 3rd party in this case is actually multiple 3rd parties. There’s several options for trusted timestamping just like there’s multiple trusted root CAs for SSL. Since the timestamping service is free and public, anyone can use it to sign anything, even self-signed certificates. There’s no mechanism to deny access, at least for this portion.
There’s always a risk the root CAs all collude and refuse to give out certificates to people they don’t like, but at least so far this hasn’t been a problem. I don’t have a better solution unfortunately. If we could have a 100% decentralized signing scheme that would be ideal, but I have no idea how you would build such a thing without identity verification and some inherit trust in the system
This isn’t “my idea”, this is how the industry already does code signing. You can’t sign something with a date of 1984 because your certificate has a start and end date, and is usually only valid for 1 year.
You can read more about how this works here: https://knowledge.digicert.com/general-information/rfc3161-compliant-time-stamp-authority-server
Code signing certificates work a little differently than SSL certificates. A timestamp is included in the signature so the certificate only needs to be valid at the time of signing. The executable will remain valid forever, even if the certificate later expires. (This is how it works on Windows)
Well, it’s an order of magnitude less force than the “server room” experienced, considering the whole rack of computers was compressed into a solid mass.
SanDisk SD cards are actually rated for up to 500Gs, and with how light the SD card is, it can survive these indirect impacts more easily. “1000s of Gs” is just a completely random estimate considering how some of the other heavier internal camera parts were damaged (a circuit board connector sheared off).