Just like positrons are the opposite of electrons maybe passkeys send private keys and keep the public ones in PKI… wait…
Just like positrons are the opposite of electrons maybe passkeys send private keys and keep the public ones in PKI… wait…
Plus it didn’t kill Goliath but stunned him. David then cut his head off.
So, you know, those who fall by the sling die by the sword
Seems normal for academia. What I would suggest is a very clear wall between those and any social media accounts and online profiles where it makes sense.
Interesting to see this one pop up again.
Steve Lehto did a good overview of this from a legal perspective
Especially the warrant argument. Dude was on parole, warrant would be an easy get instead of just being lazy.
Possible something on your motherboard has PCIe lanes that are dedicated to GPU when it’s slotted, otherwise they can be used for other devices?
For example here’s a post about m.2 slots that, when used, affect the PCI on a particular board. May be worth checking your boards manual to see if there’s something similar.
The answer not only seemed a HUGE disappointment, but a bit baffling. The pdf manual says if you occupy that 5th m.2 slot, which is the Gen 5 one, the Pci-E 1 slot is automatically downgraded to 8x. This I thought would be unacceptable if running a behemoth like the RTX 4090 I eventually plan to get, as it requires a lot of power and bandwidth.
I love the internet archive but yeah, there was just no way this wasn’t going to backfire. And by handling things the way they did they damaged the reasonable defense of archivist (not only for themselves) because publishers and others often cite that archival and backups are just “pseudonyms” “synonymous” for piracy.
They aren’t but the way this was handled made it impossible for them to argue otherwise and it also creates a legal precedent for lawsuits and judgments by publishers against others who are doing such work.
I guess the trouble is that you don’t want to read the volumes where the db files are because they’re not guaranteed to be consistent at a given point in time right?
Does the given engine support a backup method/utility that can be used to copy files to some volume on a set schedule?
Exactly. At the end of the day there’s nothing being transmitted with OTP and using a standard app isn’t an issue.
It’s a fine line. If they’re working on them reporting the issue before it’s resolved increases the risk somebody can use this as a kind of todo list of social and technical engineering weakpoints to get at other user data.
On the one hand that’s ridiculous but it’s nice to see that they didn’t throw the prior owner under the bus or give out their info.
Offloading the data to the cloud and making it accessible on other devices no longer signed into iCloud.
That is so much worse if true.
I wonder if they’re doing that to reduce the write cycles on the cells and since they’re “encrypting” the contents of the cells they figure the overall IO flag of the data being deleted is “good enough”.
So, in a perfect world, when you wipe the phone it’s basically just trashing the encryption key and so it’s useless data.
That’s all assuming that the encryption method/keys are foolproof which is always a bad bet.
And, this here makes me wonder how effective that is.
And a person claimed in a later post that “around 300” of their old pictures, some of which were “revealing,” appeared on an iPad they’d wiped per Apple’s guidelines and sold to a friend.
That’s a huge issue. Not just for photos but also files for sensitive data, secrets, etc. this, if true, is a massive issue overall since it even happening at all shouldn’t be possible.
Here’s the ELI5.
Imagine there’s a set of lockers in a school.
When a student leaves the school or changes lockers they remove the label on the locker but don’t empty it.
A TRIM, however, means that they not only remove the label from the locker by also clean out its contents.
Exactly. Even for mobile use besides accessing your home resources you can avoid your cellular provider monitoring/hijacking your traffic.
Of course self hosting means you’re still sending that info from your home network over your ISP.
So it’s a trade off there but depending on your ISP vs your cellular network makes sense.
I assume they’re past some operational limit. But as long as you have redundancy that’s a risk I’d take for the capacity
What happens when you take the output and make it the new input with “more passionate”?
E.g. how far can you push it? Or even the other way.
That’s what I’ve been playing with. Cool stuff even though it’s limited because of my 8GB nvidia card
There’s a real risk of survivorship bias here. Somebody asking about a car gets that and thinks nothing of it. A privacy minded person, however, would find it odd. And being the kind of person concerned about what could have been the cause considered the prior conversation.
I’m not saying its an unreasonable concern or technically not feasible. It’s just not how the LLM’s tend to work.
Id consider it more likely to be a bug, or general inquiries like you said, or that SO had a bunch of documents locally that reference privacy or browsing history (anytime really) that MS could have used as a kind of “here’s more about the person asking you a question”
Static files as in static file handling in a web server no CGI, modules, server side code required.