How do you not do that? It’s all in your local network, how would it not work offline…?
How do you not do that? It’s all in your local network, how would it not work offline…?
Considering Intel is behind TSMC as well, China might be quite close to Intel then.
More than enough for Apple to bend to pretty much whatever the Chinese government is asking for.
The article is from June 17th.
If there’s no setting in the iOS Settings app to take away the camera permission (which isn’t even given by default and the app has to ask for it), it can’t access the camera (unless it exploits a potential vulnerability in iOS, which I highly doubt).
It probably used data from motion sensors and the reason you saw your room was because of the glossy display. Or you have allowed the YouTube app to access your camera.
I’m waiting to see how DeepComputing’s RISC-V mainboard for the Framework turns out. I’m aware that this is very much a development platform and far from an actual end-user product, but if the price is right, I might jump in to experiment.
What I mean by that is that they will take a huge disservice to their customers over a slight financial inconvenience (packaging and validating an existing fix for different CPU series with the same architecture).
I don’t classify fixing critical vulnerabilities from products as recent as the last decade as “goodwill”, that’s just what I’d expect to receive as a customer: a working product with no known vulnerabilities left open. I could’ve bought a Ryzen 3000 CPU (maybe as part of cheap office PCs or whatever) a few days ago, only to now know they have this severe vulnerability with the label WONTFIX on it. And even if I bought it 5 years ago: a fix exists, port it over!
I know some people say it’s not that critical of a bug because an attacker needs kernel access, but it’s a convenient part of a vulnerability chain for an attacker that once exploited is almost impossible to detect and remove.
That’s so stupid, also because they have fixes for Zen and Zen 2 based Epyc CPUs available.
Intel vs. AMD isn’t “bad guys” vs. “good guys”. Either company will take every opportunity to screw their customers over. Sure, “don’t buy Intel” holds true for 13th and 14th gen Core CPUs specifically, but other than that it’s more of a pick your poison.
“flavor of the month” browser
“flavor of the month” browser Chromium
Temporarily connect the new drives via USB enclosures and clone the data via ZFS snapshots.
Pretty much any laptop with a mobile RTX 4090 and a removable wifi card then. Choose based on desired weight and size class I guess.
Privacy is not just black and white.
I’d want bluetooth for music from my phone though. And it’d be nice if my phone’s cellular and GPS didn’t get blocked.
BorgBase allows for append-only backups.
I always found it weird that the OS that attempts to limit the impact of Google’s severe privacy issues mostly only runs on hardware by Google.
As soon as Google wants to, you kind of just lose.
Is your typical noise floor even under 20 dB? HDDs are also a lot louder than 5-10 dB, and manufacturers usually list dBA in their spec sheets, not dB.
I have yet to see a good implementation of Secure Boot, and that’s just from a user interface standpoint.
How can I check which keys are installed in the EFI/BIOS UI? And then delete a specific key? I only ever saw options like “reset to factory settings”.
Factory settings are just Microsoft’s keys most of the time, and often there’s no way to delete/not trust Microsoft’s keys.
The whole system is way too intransparent. May as well turn it off.
Same (in some situations). I feel like searching for “how to do X?”, where X is a simple problem or knowledge, more often than not the classic search results are linking to articles that are way too long and talk around the solution way too much before actually getting to it (if at all).
Sure, I don’t trust the AI responses for critical stuff, but I honestly rarely trust a random blog article either.
The “Apple TV” is Apple hardware.