Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)CA
Posts
2
Comments
339
Joined
2 yr. ago

  • This seems simple for one stream, but scale that up to how many unique streams that Youtube is servicing at any given second. 10k?

    Google doesn't own all of the hardware involved in this video serving process. They push videos to their local CDNs, which then push the videos to the end users. If we're configuring streams on the fly with advertisements, we need to push the ads to the CDNs pushing out the content. They may already be collocated, but they may not. We need to factor in additional processing which costs time and money.

    I can see this becoming an extremely ugly problem when you're working with a decentralized service model like Youtube. Nothing is ever easy since they don't own everything.

  • Thankfully it seems that encoding ads into the video stream is still too expensive for them to implement.

    I'm assuming that asking CDNs to combine individualized ads with content and push the unique streams to hosts does not scale well.

  • I share your thoughts. Feels like for better or worse, this generation has exceedingly few true console exclusives. The Xbox ecosystem offers more sales in my corner of the world plus the option for gamepass if you’re so inclined, so it seems like a better value.

    I finally picked up a PS5 on sale for a family holiday gift. I originally wanted to grab one for VR, but the longer I hold off, the more I’m seeing that it’s simply not a competitive package for that gaming space. I don’t have a gaming computer, so I’m limited to a few options, but for what my kids are interested in, a Quest 3 just offers more.

    It’s kind of dumb. I want to spend my money on VR, but I don’t want to waste it. It’s a bit of a catch-22 where the ecosystem needs supporters now to grow, but people like myself don’t want to support it because it hasn’t grown (to meet the competition’s offerings, anyways)

  • They are incompatible thoughts. Peacetime posturing and wartime posturing involve completely different priorities and lines of effort for governments.

    Wartime governments need to prioritize their war efforts. Peacetime governments do not - while there may be some light overlap for creation and maintenance of a self defense military force, individual liberties are not restricted, economic efforts are not diverted to replenish critical resources, and industrial outputs are not shifted to materiel production. Posturing for war places extreme stress on a nations ability to participate in global commerce and academia.

  • We must remember that Russia and China do not differentiate between peace and war

    The hostile intentions and actions of our adversaries show that they consider themselves to be at war with the West

    I don’t think that words have consistent meanings coming from this guy. If their adversaries (China) show that they consider themselves to be at war, then they also consider themselves to be at peace?

  • The bolt has always been a strange car for the sake of being strange. I went to look at one and was turned off by non-symmetric two-toned seats, the generally ugly exterior, and just weird control interface. I’ve had cheap cars including a Chevy Aveo, so barebones functionality doesn’t scare me.

    I kind of wish it was just like a Malibu or something with an EV drivetrain. A lot of people don’t want an EV as a status symbol. For those who do, they wouldn’t buy a GM product anyways…

  • Honeypots have gotten really weird lately. Anti-honeypot (along with anti-VM and anti-debugging) techniques and methods are more common than ever. I think something like 80% of all APT-level malware from the past 5 years use these techniques

  • It's best to purchase an old router which doesn't support new protocols to learn with. It should only be used for your testing - not meant for normal use. WEP will be several orders of magnitude easier to crack than WPA2 or WPA3. Tools can help you break certain implementations of encryption regardless of how many bits of entropy that are being used - often by addressing weaknesses in the algorithms or cryptologic pathways vice brute forcing. That's often the kind of thing demonstrated in conferences and featured in research papers.

    As far as everything else is concerned, you'll get there if you stick with it. I'll echo what others have said in this thread; there are some serious diminishing returns for attaining absolute security, all of which can be bypassed by attacking you.

  • Best place to start is by vacuuming up some open courseware from MIT on the topics you’re interested in. RF fundamentals, basic wireless communications, maybe some basics of network security and fundamentals of computer security or cryptology.

    You need a knowledge base in order to know what to look for when you run into problems, else you just kind of waste a lot of time.

    Then, familiarize yourself with wireshark. Start the program and visit a few http websites to see what information your computer is transmitting and how it’s formatted. Your goal is to ultimately snoop on this information and modify it. You need to know how to change a character in the middle of a packet to deliver an effect. If none of that makes sense…

    Learning an SDR is honestly a bit of a pain. You can get a $30 antenna on Amazon that covers the ~1-6 GHz range and that will enable a lot of what you want to do. Try to pick up on old router that supports the WEP protocol. It’s old and deprecated with lots of information on how to break it.

    Combine the SDR with your computer and wireshark to visit a webpage with HTTP. You’re almost certainly going to run into problems manually isolating and cleaning up the WiFi signal on your SDR into something that’s useful, but you probably have enough to start you off on your journey. If you can capture the WiFi traffic and convert it from an analog waveform into a digital bitstream, then you can finally begin doing useful things. Of course… you need to decrypt the bitstream and account for errors.

    Good luck