It doesn't look good with the hidden spyware listed on Wiki. I know Google is doing similar things but I would rather pick a less rotted apple.
Isn't Asus disable the bootloader unlook and lost a case? I think I read this somewhere in Lemmy.
My Sony xz2c does have bloats installed, namely amazon and facebook. Don't know what the state they're in now tho.
If you're a manufacture, what incentives LPCAMM2 gives you over soldering the RAM? With soldering, you can upsell the upgrades and force ppl to replace the whole machine every 1-2 years. How does LPCAMM2 benefits the company? I'm talking in general, not some niche manufacturers like Framework.
TBH, I don't think many will adopt this. Maybe it will show up in some expensive laptops like high end gaming and workstation, but majority of them wouldn't.
I'm using wise now but all 3 quota are used for various places already.
Not too knowledge in crypto. Learn something new today.
Can Revolut do per service as Privacy.com?
Come back when it is accepted everywhere like cards today
Recently I just hit by stolen card detail and makes me searching a virtual card service. Anyone knows any works in the UK and EU region? Apparently Privacy.com needs SSN to work now. Thanks.
The FBI, UK National Crime Agency, and Europol have unveiled sweeping indictments and sanctions against the admin of the LockBit ransomware operation, with the identity of the Russian threat actor revealed for the first time.
Malicious compliances in action. Not that you can't do, but this can tense up the relationship.
Got it. I can see where the problem is niw and how can the hardware is limiting. Thanks for the great article.
Well, I'm simply reciting what is described on the page based on my understanding. From the diagram, it does not do raw frame processing from the source (assuming HDMI w/ HDCP) as the stream remains encrypted. By the look of it, it is copy or passthrough to the muxer (as it labeled). With some magic, it muxes two encrypted streams into one and output to the video sink. How is that done I have no idea.
It doesn't and I didn't ever mentioned HDMI in my reply. Just doubt if overlaying another encrypted stream with a muxer ever need that much processing power to the point of "prohibitively expensive".
Overlay isn't transcoding. All it need is a muxer like MKVToolNix. I doubt it need much processing power.
As OP said volume leveling is acceptable, something like this will do.
Modifying HDMI video signal is simply impossible due to DMCA and bla bla bla. But not all hope is lost though. You can overlay opaque video on top of another encrypted stream via this little box. This is an old project per se and I have no idea if still available, but with some dirty work you might able to detect the increase of volume or match of an algo or something with a total black screen overlay on top.
Yeah, for the pic you used as example, the tool will just create something that fits. Not really "unblur" the image but guess what it would be with the info it have. It will be very likely not the same face versus the original.
However, recreating background maybe easier and accurate enough for a geo guesser or a ML model to figure out roughly where the image was taken.
Security wise, maybe. You might be more protected against cred stuffing but reusing password on multiple services at the first place is already a big no no.
I do remember 1-2 years ago there is a paper (or model?) that reverse blured images. It's similar to how ML based object remover and inpainting works. Granted it only works for specific blurring algo.
multiple email account? Not really. It is typically implemented using some email proxy or alias like anonaddy or simplelogin. By the look of it is multiple accounts, but in fact you're just receiving mail forwarded to you in one account. All you have to do is append any strings as the user with your domain.
(anonaddy and simplelogin requires adhoc address generation using subdomain by them or a domain owned by you with MX records pointing to their servers)
disclosure: I'm a current customer of anonaddy. Never used simplelogin though.
If I'm the dev, I would scrape off Google Street View with cords as data source.
Require publishers to leave videogames (and related game assets / features) they have sold to customers in a reasonably working state when support ends, so that no further intervention whatsoever is necessary for the game to function, as a statutory consumer right.
tl;dr: we will do nothing about it
Full response below
---
The Government recognises recent concerns raised by video games users regarding the long-term operability of purchased products.
Consumers should be aware that there is no requirement in UK law compelling software companies and providers to support older versions of their operating systems, software or connected products. There may be occasions where companies make commercial decisions based on the high running costs of maintaining older servers for video games that have declining user bases. However, video games sellers must comply with existing consumer law, including the Consumer Rights Act 2015 (CRA) and the Consumer Protection from Unfair Trading Regulations 2008 (CPRs).
The CPRs require information to consumers to be clear and correct, and prohibit commercial practices which through false information or misleading omissions cause the average consumer to make a different choice, for example, to purchase goods or services they would not otherwise have purchased. The regulations prohibit commercial practices which omit or hide information which the average consumer needs to make an informed choice, and prohibits traders from providing material information in an unclear, unintelligible, ambiguous or untimely manner. If consumers are led to believe that a game will remain playable indefinitely for certain systems, despite the end of physical support, the CPRs may require that the game remains technically feasible (for example, available offline) to play under those circumstances.
The CPRs are enforced by Trading Standards and the Competition and Markets Authority. If consumers believe that there has been a breach of these regulations, they should report the matter in the first instance to the Citizens Advice consumer helpline on 0808 223 1133 (www.citizensadvice.org.uk). People living in Scotland should contact Advice Direct Scotland on 0808 164 6000 (www.consumeradvice.scot). Both helplines offer a free service advising consumers on their rights and how best to take their case forward. The helplines will refer complaints to Trading Standards services where appropriate. Consumers can also pursue private redress through the courts where a trader has provided misleading information on a product.
The CRA gives consumers important rights when they make a contract with a trader for the supply of digital content. This includes requiring digital content to be of satisfactory quality, fit for a particular purpose and as described by the seller. It can be difficult and expensive for businesses to maintain dedicated support for old software, particularly if it needs to interact with modern hardware, apps and websites, but if software is being offered for sale that is not supported by the provider, then this should be made clear.
If the digital content does not meet these quality rights, the consumer has the right to a repair or replacement of the digital content. If a repair or replacement is not possible, or does not fix the problem, then the consumer will be entitled to some money back or a price reduction which can be up to 100% of the cost of the digital content. These rights apply to intangible digital content like computer software or a PC game, as well as digital content in a tangible form like a physical copy of a video game. The CRA has a time limit of up to six years after a breach of contract during which a consumer can take legal action.
The standards outlined above apply to digital content where there is a contractual right of the trader or a third party to modify or update the digital content. In practice, this means that a trader or third party can upgrade, fix, enhance and improve the features of digital content so long as it continues to match any description given by the trader and continues to conform with any pre-contract information including main characteristics, functionality and compatibility provided by the trader, unless varied by express agreement.
Consumers should also be aware that while there is a statutory right for goods (including intangible digital content) to be of a satisfactory quality, that will only be breached if they are not of the standard which a reasonable person would consider to be satisfactory, taking into account circumstances including the price and any description given. For example, a manufacturer’s support for a mobile phone is likely to be withdrawn as they launch new models. It will remain usable but without, for example, security updates, and over time some app developers may decide to withdraw support.
Department Culture, Media & Sport
Royal Mail, the British postal and courier service began switching all snail mail stamps to barcoded stamps last year. The purpose of the barcode was to enhance security, deter stamp reuse, and possibly prevent forgeries—which it has failed to do.
If a stamp have a barcode, why not just let people who have printers at home to print it on the envelope directly? This eliminates the need to buy physical stamp, thus the probability of buying counterfeit stamps.
I want to host a small game server for friends and myself in my home but doesn't want to open up the firewall. Any tunneling solutions supports UDP? Thnaks.
Anyone tried it? I'm planning but saw the benchmark is pretty bad. Unsure if I interpret correctly.
YouTube Video
Click to view this content.
As a PC player, I never grasp why console players are willing to pay a ransom to access a product and service they already paid for.
And worst, this video shows M$ double dip dev by taking a 30% cut plus the cost of game service (like logins, verification, lobby, etc) unlike Steam that already have it covered in that cut, and triple dip by asking player to pay more.
As IBM highlights, existing FlashSystem products already scan all incoming data as it is being written, without impacting performance. The new AI-enhanced FlashCore Module 4 (FCM) is...
Am I too pessimistic about this? Today it can detect ransomware, the next day could be malware, and the day after can be any file.
It's just a data filter that's build in to a hardware and possibly no way to trun off. Last thing I want is a black box watching what I stored on my drive.
cross-posted from: https://lemmy.ml/post/12593641
> I want to share some images securely with self destruct. Is there any alternatives can do what Unsee.cc does excluding chat? > > So the functions I'm looking for: > - Self-expiring image > - Copy protection > - Store in RAM > - (optional) watermarking > - (optional) share more types of documents like PDF > > Thanks in advance.
I want to share some images securely with self destruct. Is there any alternatives can do what Unsee.cc does excluding chat?
So the functions I'm looking for:
- Self-expiring image
- Copy protection
- Store in RAM
- (optional) watermarking
- (optional) share more types of documents like PDF
Thanks in advance.
I'm setting up FDE and wonders which one is better. "LVM over LUKS" or "LUKS over LVM"? Or something else? Does one is definitely better then the other? What are your preference?
Thanks.
Google during a testimony in the Epic vs Google trial said that a deal with Spotify allows the audio company to completely bypass Play Store fees.
NetBird combines a configuration-free peer-to-peer private network and a centralized access control system in a single cloud platform.
cross-posted from: https://lemmy.ml/post/8144135
> Just stumble it on YT. Anyone tried Netbird? How this compares to Tailscale w/ headscale?
NetBird combines a configuration-free peer-to-peer private network and a centralized access control system in a single cloud platform.
Just stumble it on YT. Anyone tried Netbird? How this compares to Tailscale w/ headscale?
TBH I have a mixed feeling about this.
The UK government has proposed using hash scanning to detect abusive material without violating people’s privacy. Unfortunately, it won’t work.
This is an continuation of my last post, specifically a comment from @rufus@discuss.tchncs.de:
> It will never get recommended. It’s bad for the network and bad for your privacy.
Excluding that doing so is bad for the network, why it is "private" using VPN but not Tor, inferring from common consensus. The main point in the blog post is a protocol level problem:
> apparently in some cases uTorrent, BitSpirit, and libTorrent simply write your IP address directly into the information they send to the tracker and/or to other peers
Tor and VPN are both transports what wrap other traffic within. If that statement is true, no transport can save the information leaking nature of the BT protocol itself.
An increasing number of people are asking us about the recent paper coming out of Inria in...
It's been 13 yesrs after this blog was written. Does the claim still holds true?