Uh… How is it a distraction? It’s the same problem
Lemmy shouldn’t have avatars, banners, or bios
Uh… How is it a distraction? It’s the same problem
Gelsinger was hired as a known long time engineer, rather than as a business expert. I would trust his numbers from an engineering perspective, even though I was laid off under his rule
Isn’t it too late for it to matter? At this point, she’s on the ballots that she’s on, isn’t she?
Especially for states like Oregon that are primarily vote by mail. I already have my ballot, and Stein withdrawing won’t keep people from voting for her
I’m shocked at what an unpopular thought this is. Like… If you go out in public, there’s a very real risk that people in public will see you. If that’s a concern you have, then you should take steps to not be seen in public. To me, that would mean not making my presence obvious when visiting a bar.
Camera or not, if people are looking for you, they will find ways to look for you in public places. You should always assume you’re being watched, because you probably already are.
- 7 felt like it was mine
I remember that marketing campaign. Windows Vista had a shaky launch, because the hardware manufacturers hadn’t polished the Vista-compatible drivers yet. 6 months later, they had caught up, but people still had a bad taste from it.
So when service pack 1 came out, Microsoft made a reskinned version of it and started an ad campaign with “customers” claiming “Windows 7 was my idea!” and the public ate it up.
I have such bad things to say about recruiters. They generally don’t have a clue about any of the skills related to the jobs I’m after, and they take a huge cut of the pay the entire time I’m working the job.
On the other hand, the two best jobs (highest pay and best working environment) I’ve had in my career, I got through recruiters, so I acknowledge them as a useful business when it works out. The last one has led to the company buying my contract and hiring me directly for the past 12 years
My experience says a lot of these people bought into the “fake news” narrative, where they conveniently don’t believe anything presented to them, no matter how digestible – unless it reinforces things they already believe.
My mother goes on about how “science” can be used to prove anything, and “science” gets it wrong so often, so she won’t believe anything she reads. While turning around and saying she found out Planned Parenthood is harvesting and selling baby parts, which is why they want mass abortions across the US
Ah right, the “how about we compromise and just have a little genocide” option
I don’t understand how you got that from the image.
Both monitors on the senior side of the image are showing coding environments
I say we lose the entire Crowder meme format. The “change my mind” bit was from one of his stunts, and this is just keeping it alive longer
There’s still many other meme formats that send the same message, we don’t need to sully Calvin’s image by associating it with a Crowder stunt
Not quite this, but I did have a validation team that didn’t know when to quit.
The project was a Windows service, and they would be constantly opening bugs saying “program crashes when we deleted xxxxx.dll”
Like… Yeah. If you delete necessary libraries from the installation directory, the program won’t run correctly.
Atleast one must get physical access to the lock in order to pick it.
It’s a fair point, but if we’re taking about cars, I’d say physical access is a given. Keyless vehicles haven’t quite enabled remote car thefts just yet
Be a lot cooler if they did
Imagine programming a computer without understanding the machine code that tells the CPU what to do
It’s free, so when I need to ask about something in the news today, I’ll use Bing. Granted I use a browser extension that lets me use Bing in Firefox.
These are useful tools, but not useful enough that I’m willing to pay for them when there’s free options.
Generally commercial drive encryption solutions, like Bitlocker, usually has a backup recovery key that can be used to access the encryption key if your TPM is reset, or if your device dies.
So I guess the short answer is most of these solutions don’t fully protect it from being moved to another device, they just add another layer of security and hassle that makes it harder to do. And without the TPM as part of these solutions, you would be entering a 48-character passphrase every time you boot your device, which has several security flaws of its own.
Assuming you use bitlocker on your PC, how do you know the entire content of the TPM (your bitlocker encryption key, etc) cannot be fetched from the TPM by the manufacturer or any third parties they shared it tools and private keys with?
The TPM specification is an open standard by the Trusted Computing Group, and there are certification organizations that will audit many of these products, so that’s a good place to begin.
As with any of the hardware in your device, it does require some amount of trust in the manufacturers you have chosen. These same concerns would apply to anything from the onboard USB controllers to the CPU itself. There’s no way to be absolutely certain, but you can do your due diligence to get a reasonable level of confidence.
And because it is hardware based, how do I as a user know that it does what it claims it does as I would with a software based encryption software that is open source (like truecrypt/veracrypt).
This is a reasonable thing to think about, although very few individuals are qualified to understand and audit the source code of encryption software either, so in most cases you are still putting your faith in security organizations or the community to find issues.
When it comes to security, it often comes with a trade-off. Hardware devices can achieve a level of security that software can’t completely reproduce, but they are a lot harder to audit and verify their integrity.
In any case, the TPM is something that software solutions have to explicitly call in the first place, it isn’t something that activates itself and starts digging into your hard drive. Which means if you don’t want to use it in your security solution, then it will sit there and do nothing. You can keep using your encryption keys in clear memory, visible to any privileged software.
I don’t know specifically about the XBox and how it uses it, but the TPM absolutely can be used as part of a DRM scheme. Since the TPM can be used to encrypt data with a key that can’t be exported, it could be part of a means to hinder copying of content. Of course this content still has to be decrypted into memory in order to be used, so people looking to defeat this DRM usually still can. DRM as a whole is often shown to be a pretty weak solution for copy protection, but companies won’t stop chasing it just the same.
Well I have good news for you, the TPM can’t do those things. The TPM is just a hardware module that stores cryptographic keys in a tamper-resistant chip, and can perform basic crypto functions.
In of itself, it can’t be addressed remotely, but it is usually used as a component of a greater security scheme. For example, in full disk encryption, it can be used to ensure that disk can’t be decrypted on a different device.
There’s been a lot of FUD surrounding TPMs, and it doesn’t help that the actual explanation of their function isn’t something easily described in a couple of sentences.
There’s no reason to be afraid of a TPM, and for the privacy-minded and security-conscious, it can even be used as part of a greater security scheme for your device and its data.
Of course at the same time, it’s not a feature most home users would make full use of, and as for not liking Windows, carry on. There’s plenty of reasons to avoid it if those things are important to you
This is a great argument for using a pwa in Firefox rather than a native app. Your “in-app browser” can have ad block
Iran was against Trump, so they didn’t win