Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IL
Posts
1
Comments
572
Joined
2 yr. ago

  • Yeah, downloading on 56k was not fun. My average per song was 1 hour, which I thought was decent considering it was free. My house got an additional line just for internet.

    We eventually got a coax modem, I was at high school at the time when we went high speed too. I felt like I was in the future. Lol.

    What I missed was losing access to AOL sites though but now that I look back, those were kinda trash.

  • The rules also ban the use of facial recognition equipment in public places such as hotel rooms, public bathrooms, public dressing rooms, and public toilets.

    This makes sense.

    But this also means private businesses are still allowed to use facial recognition everywhere else you aren't getting naked, lie a hotel lobby.

  • That’s what heavily state subsidised and controlled manufacturing will get you.

    I heard about the heavy state subsidies from someone living there. Sounds good to me.

    What does controlled manufacturing mean?

  • I just came back from Thailand. I got a Grab and driver pulls up in a BYD. I have never been in one. It is a really nice car from what I can see. I asked dude how much the car was. He said it was under ฿1M Which is $30,000 US. I was shocked.

    I saw hybrids and electric cars everywhere there.

  • I am not a mechanical engineer. I just love going to all the stuff on this site and seeing what I could potentially make.

    Note, I have never made anything that isn't made of wood, Lego bricks, paper, or paracord. Lol.

  • Permanently Deleted

    Jump
  • Depending on how Bluetooth stacks handle HCI commands on the device, remote exploitation of the backdoor might be possible via malicious firmware or rogue Bluetooth connections.

    I really wish these articles just tell us what these scenarios are. I understand companies need publicity or need to sell software but if it isn't replicatable and the article says "might be possible" it kind of sounds like a secuity sales pitch.

    This is especially the case if an attacker already has root access, planted malware, or pushed a malicious update on the device that opens up low-level access.

    This part basically sounds more like a software issue where the attacker has a way in already. The system is already vulernable at this point before using the exploit found.

    I don't think there's enough information out yet.

    It is very interesting though.

  • Why would Humane delay an OTA update to give access to the device just because a small group of users are using an access certificate? You are punishing the entire class just because one student kept on talking.

    I don't trust this company. They have been lying to their users from the very beginning.

  • I use F-droid. I don't check hash keys but having that kind reassurance is definitely better than trusting F-droid blindly.

    I have had issues F-droid uploads before.

    So Accrescent has only a limited number of apps and only installs on Android 10 and up.

    If you want something with less limits, you can use Obtanium with AppVerifier, or APKMirror, which also has the hash keys available.