There might be some double counting, but it doesn’t matter - this just illustrates the insane scale of these companies.
There might be some double counting, but it doesn’t matter - this just illustrates the insane scale of these companies.
As long as I can still get notifications and see the time, I don’t think I care.
please enlighten the rest of us
no list of apps anywhere
This approach is doomed to fail, so long as the general public isn’t aware of the problem or its scale. Government regulation is the only way.
Depends on what country you live in. Just because they call is that doesn’t mean the law and courts will see it their way.
Relatedly, check out www.StopKillingGames.com. When you buy a game without an expiration date on the box it either is illegal or should be explicitly made illegal to destroy your copy of the game when the company shuts down their servers. Stop Killing Games is a campaign to stop this from happening, and it’s actually getting some progress like being noticed and picked up by politicians. If you know Freeman’s Mind, Civil Protection, or Ross’s Game Dungeon, this campaign was started by Ross Scott (Accursed Farms) who made all of those.
Edit: quote from the FAQ in the website:
Q: Aren’t games licensed, not sold to customers?
A: The short answer is this is a large legal grey area, depending on the country. In the United States, this is generally the case. In other countries, the law is not clear at all, since license agreements cannot override national laws. Those laws often consider videogames as goods, which have many consumer protections that apply to them. So despite what the license agreement may say, in some countries you are indeed sold your copy of the game license. Some terms still apply, however. For example, you are typically only sold your individual copy of the game license for personal use, not the intellectual property rights to the videogame itself.
I have heard that at least the main ingredient being advertised must be real and the actual product. So for example, in a McDonald’s commercial the patty must be an actual edible McDonald’s patty, but the vegetables and bun can be made of whatever.
That’s significantly worse privacy-wise, since Google gets a copy of everything.
Obviously, but I still haven’t gone through all the things I’ve ever signed up to and changed my email to the proton one. When I sign up to new stuff I use Proton, this is a necessary step for transition… And one that is likely to stay in place for a very long time since I’m going to keep procrastinating it.
Unless you’re using proton mail anonymously then you don’t need to consider the recover email as a weakness.
Excellent point.
FYI email contents were not decrypted or turned over to police, as far as I know Proton’s E2EE is still as good as whatever system you’re using. Proton doesn’t have the keys to decrypt your emails, it never did. What they have access to is metadata that is necessary to function when your private key is unavailable - e.g. your public encryption key used to encrypt incoming emails from non-Proton sources, or in this case, a recovery email address (I don’t know what the recovery process entails and whether it can restore encrypted emails).
Don’t put any recovery info on Proton
About that. I’m still making the transition from gmail and currently most of my mail still goes to gmail first and gets forwarded to Proton through their easy switch process. Surely this is just as up for grabs as a recovery email, right?
FWIW I’m not likely to be investigated any time soon so I’m not worried either way.
Not really, Linux is still vulnerable and there is a mitigation but it opens a side channel attack.
This technique can also be used against an already established VPN connection once the VPN user’s host needs to renew a lease from our DHCP server. We can artificially create that scenario by setting a short lease time in the DHCP lease, so the user updates their routing table more frequently. In addition, the VPN control channel is still intact because it already uses the physical interface for its communication. In our testing, the VPN always continued to report as connected, and the kill switch was never engaged to drop our VPN connection.
Sounds to me like it totally works even after the tunnel has started.
They could not care less, this is so ancient and irrelevant.
While true, I wonder how many games actually do this.
I think even the imperfect sensor data is enough to beat a human. My main argument for why self-driving cars will eventually be objectively safer than the best human drivers (no comment about whether that point has already done) is this:
A human can only look at one thing at a time. Compared to a computer, we see allow, think slow, react show, move slow. A computer can look in all directions all the time, and react to danger coming from any of those directions faster than a human driver would even if they were lucky enough to be looking in the right direction. Add to that the fact that they can take in much more sensor data that isn’t available to the driver or take away from precious looking-at-the-road time for the driver to know, such as wind resistance, engine RPM, or what have you (I’m actually not a car guy so my examples aren’t the best). Bottom line: the AI has a direct connection to more data, can take more of it in at once and make faster decisions based on all of it. It’s inherently better. The “only” hurdles are making it actually interpret its sensors effectively (i.e. understand what cameras are seeing) and make good decisions based on this data. We can argue about how well either of those are in the current state of the technology, but IMO they’re both good enough today to massively outperform a human in most scenarios.
All of this applies to an AI plane as well. So my money is on the AI.
I see this as a positive: when both sides have AI unmanned planes, we get cool dogfights without human risk! Ideally over ocean or desert and with Hollywood cameras capturing every second in exquisite detail.
I want to say “passkeys” but if I’m honest, that too is susceptible to this attack.
I’ve just finished reading the article, it does not say this. It says Intel also has a DMP but that only Apple’s version has the vulnerability.
Can I both upvote and downvote you? Seems most appropriate
I am not an explosives expert, but I’ve seen enough YouTube videos about explosives to know that not all explosives explode in fire. Some are incredibly stable at extreme conditions right up until deliberately triggered. It all depends on the type of explosives.
There may still be ways to detect them, but it’s not necessarily going to be that simple.