Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SP
Posts
0
Comments
121
Joined
2 yr. ago

  • Sales slowing is only one variable in the “growth” equation. Specifically, are sales of gas vehicles slowing more than sales of electric cars? Yes.

    People are replacing vehicles at some standard rate, but growth of EVs is dependent on what percentage of new vehicle sales are gas versus electric. As long as people aren’t moving back to gas cars en masse, the growth of the segment can continue to rise, even if sales overall are slowing.

  • No, absolutely not. Even if you could buy the 30-50,000 parts individually, the markup alone would absolutely kill the feasibility, much less the ability to weld the frame components together, assemble the literal miles of wiring, or program the computers.

  • Even as a power user… You can’t.

    And, in the 21st century, nothing on your computer is safe and private, least of all, browser extensions.

    Even if an extension is safe today, with a tiny handful of notable exceptions, it will be”monetized”, or bought and sold to someone that will use it to install adware on your system, train their AI model, or steal your personal information.

    There is no feasible defense to this for a layperson, other than absolute transparency in FOSS, and even that is under attack via flaws in the software supply chain.

    The best a layperson can hope for is that major vendors care more about exclusivity and locking others out of their ecosystem, such that they are the only ones who have full control of your data (Apple, Google, Microsoft).

  • "My mother ... would give us a hard time sometimes, and she would say to us, 'I don’t know what’s wrong with you young people. You think you just fell out of a coconut tree?' " Harris said with a laugh. "You exist in the context of all in which you live and what came before you."

  • It does when you have physical access to the RAM and storage, and a disassembly lab expressly configured for this purpose.

    This is the backbone for a number of forensic services offered to law enforcement, and an entire cottage industry. I know with certainty it was still feasible as of the iPhone 12, which is well inside of 15 years. I don’t believe the architecture in the 13 or 14 has changed significantly to make this impossible.

    With slightly earlier phones, tethered jailbreaks are often good enough, though law enforcement would more likely outsource to a firm leveraging Cellebrite or Axiom as the first step.

  • Most phones are locked with a four digit numerical PIN. The current technique is taking an image of the flash memory, and reflashing the memory after every few attempts.

    It still takes a bit longer than straight brute force without a temporal lockout, but it’s still pretty trivial.