Sure, if you want powerful processors. But if you don’t need a lot of power, you could make this into a prox card that’s thin, light, and flexible, and can do whatever cryptography you need on-chip.
Sure, if you want powerful processors. But if you don’t need a lot of power, you could make this into a prox card that’s thin, light, and flexible, and can do whatever cryptography you need on-chip.
The headline is extremely optimistic, but it’s not clickbait.
Considering you can assign any IME to any file, that means technically it supports everything from plain text to proprietary binary data.
I’m sure it’s already happening.
Not just games, movies too. And anything that gets Tencent money ends up with subtle pro-China propaganda.
That doesn’t mean it’s good.
True, but colonizing other planets is more distant a goal than making our own stable.
How do you figure? If the DRM depends on them, doesn’t that give them the power to destroy it?
How dare journalists be compensated for their labor!
That’s the thing, though, it’s not a loophole. It’s intentional. It makes a good headline, but it doesn’t really do much.
Much like California’s other good-sounding laws, the fine print is what gets you on both ends, both in the law and in the EULA you agree to when signing up that’s going to say that all transactions are explicitly a terminable and revocable license.
The weirdest one I found was a site that would only check to see if what you entered started with the correct password. So if your password was hunter2 and you tried hunter246, it would let you in.
Which means not only were they storing the password, but they had to go out of their way to use the wrong kind of string comparison.
ClamAV is great for exactly one thing: checking the “has antivirus” checkbox on company security audits.
Don’t get me wrong, it’s a real AV product, but there’s no real need for it. You’ll get much better results just being careful about what you run and having a system and network firewall. And not running everything as root.
Mine is the null string. They’ll never guess it!
You break it down into chunks and delegate. They’re not expecting any one person to implement the whole thing.
I hate that anyone has to be told not to truncate passwords. Like even if you haven’t had any training at all, you’d have to be advanced stupid to even come up with that idea in the first place.
“Don’t use virtualization”, says exec whose product doesn’t run on virtualization
If there was ever an argument against intelligent design, it’s shit like this.
TIL! I hadn’t heard about that.
“Dark energy” is the placeholder. Dark matter is, as far as we can tell, real, actual matter that just doesn’t really interact with other matter or energy very much. But it still exerts gravity.