Owned by Tesla but leased to the public. In the UK it’s common to lease a new car rather than purchasing it, and often the car manufacturer has a financial services arm that manages the lease.
probably not so useful in practise, but still fun and interesting.
Yes, centralised C2 is definitely still a thing in the malware space, for commodity malware it works well enough that there's little real incentive to move to anything more complex.
Not quite, it talks about configuring your home network to resist those things (as per the title). It’s just that the home network happens to be in China.
It’s a useful writeup, I’ve done similar things outside of China to facilitate split tunnelling or bypass geoblocking.
Maybe not on compsci? but when I did electronic engineering it was covered as part of our embedded systems course.
There’s quite a lot of info out there on UEFI, and tiano core is open source. I taught myself enough to implement a small game you had to solve to be able to boot your machine, for example :)
It’s a bold assumption that only China is tracking this info though. Mobile operators are some of the worst at selling ‘anonymised’ data on their users
Is it not worth it to keep private data flowing through companies which we could hold to account and, perhaps later on, restrict from such practices, than flowing through a jurisdiction over which we have no control and which does not much care about our opinion?
Is it possible? The EU is finding now that it is hard to keep data from the USA, which as a jurisdiction falls as much into that category as China does.
I would argue it is not possible to ever consider the internet 'safe' because you happen to flow through country x, and not country y. Instead, we must keep working on the protocols that we use to try to reduce exposure as much as possible.
Depends. Obviously Tanzania can't do it. Neither could the EU, the tech sector's not big enough. But the US could. And you can always keep it to "geopolitical allies", or at least away from "geopolitical enemies".
> I would argue it is not possible to ever consider the internet 'safe' because you happen to flow through country x, and not country y. Instead, we must keep working on the protocols that we use to try to reduce exposure as much as possible.
Firstly, there are only three ways that I know of to keep metadata (not content, which can simply be encrypted) away from the people that route your packets.
1) Onion routing (Tor). This cannot be used for general purpose multimedia usage because of slow speeds (any slow middle node can make it slow, and the higher you speed you require your nodes to bee, the fewer nodes you have, lowering the security of your network)
2) VPNs. This obviously pushes the problem of trust back to the VPN company. Which is fine, it only needs to be more trustworthy than the ISP. But jurisdiction is a very important topic here, which only makes my point more so.
3) Put everything on one of a few global CDNs. That way, all network traffic is just encrypted requests to Google, Cloudflare, Amazon and Azure servers. This obviously has the problem that the CDN company now know what you're doing.
Unfortunately, the EU doesn't seem interested in private protocols.
Your comment made me stop and calculate and I was surprised to find I’m similar. When I really need to focus groove salad has always been my thing. Sometimes I find myself reluctant to putting it on because I know I’ll get sucked into the task and not surface again for a long time.
I don’t know, I have definitely been approached by someone with that exact statement before. Then I have to figure out what they’re actually trying to achieve to avoid an x-y problem, and figure out the right solution.
I would totally expect a good interview candidate to be able to ask questions to establish the context
I think it's probably from "I'm Sorry, I Haven't a Clue". I think the game was Film Club, there they have to suggest films that would appeal to a certain demographic. The demographic was "Cheese Makers", and the answers were "Cheeses of Nazareth", then others like "Fromage to Eternity", "The Rock Fort" etc.
Plausible, yes. Most of my cohort are fans of the late Humph & the gang. Barry Cryer, of course, wrote for a lot of other comedians so gags often originate from or propagate via him
In this case, both fair and fare are words in English. Which shows that spell checking needs to know a lot about grammar and context to work in general. Basically you need an LLM. Or if not a 'large language model', perhaps at least a small language model.
I wonder how it does work, I remember MS Word having a fairly decent grammar checker when I was using it in school - which predated LLMs by many years!
I suspect an LLM wouldn’t be the most optimal choice
reply