alphafalcon

joined 1 year ago
[–] [email protected] 5 points 6 months ago (2 children)

Ah, you "work" in "marketing"?

[–] [email protected] 2 points 6 months ago

Zur besseren Findbarkeit: Es heißt "Lateral" with Tom Scott, von lateral thinking - Quer- oder um die Ecke denken, aber ohne die Konnotation, die Querdenken seit Corona hat.

[–] [email protected] 19 points 7 months ago

They occupy a strange niche full of contradictions.

Entering the code on the device itself should increase security as opposed to entering it on a compromised computer.

But plugging it into a compromised computer means the data is compromised anyway.

Their security is way harder to audit than a software solution like PGP. The actual "encryption" varies from actual decent setups to "entering the code connects the data pins with no actual encryption on the storage chip"

Not having to instal/use software to use them means they are suitable for non-technical users which in turn means more support calls for "I forgot the pin, it wiped itself, can you restore my data"

They are kind of useful to check the "data is transported on encrypted media" box for compliance reasons without having to manage something bigger.

[–] [email protected] 3 points 7 months ago

Wow, that sounds like a decent start for an architecture.

I'm tempted to spin up a few Jellyfin instances to see how it might work...

[–] [email protected] 30 points 7 months ago (5 children)

JellyFed(eration) would be awesome. It should use an anonymous overlay network so federation is not limited to people you trust in copyright-zealous jurisdictions.

[–] [email protected] 2 points 7 months ago

Teenagers and a dog sound like Scooby Doo. No idea how specific the rest is.

[–] [email protected] 5 points 7 months ago (1 children)

That's the equivalent of leaving the door open and hanging a sign "Internet over there" pointing at a wall.

Programs don't need to respect those registry keys. If you're worried about internet access, set up a firewall.

Also, if you're worried about malware, the damage is probably done before anything connects to the internet.

[–] [email protected] 5 points 8 months ago

B stands for Billion (Parameters) IIRC

[–] [email protected] 1 points 8 months ago

Should not be a problem with proper planning. Assuming the Trace tracks side along apparition and shows the destination, just have another mode of transport waiting at the destination.
Apparition -> broomstick -> knight bus would be a simple chain to set up.

Alternatively, depending on the exact mechanics of the trace, multiple apparitions from the same spot could be confusing as well, possibly even in addition to the poly juice plan.

If the trace does not record the identity of the underage wizard that's causing the alert, adding more underage wizards to the equation would cause total mayhem, especially given the usual "competence" of the ministry.

Depending on how cunning you get, using an information channel you control to feed the opposition false information should be possible as well. Set up a plan requiring specific spells, cast them near "traced" Harry and walk the opposite direction.

[–] [email protected] 2 points 8 months ago

To a certain degree, yes. If someone at Google decides to wage all-out war against ad blockers they have a good chance. But if that costs more money than it generates, odds are that someone will stop it. Google / Alphabet is publicly traded after all and that means profit above all else.

[–] [email protected] 4 points 8 months ago (2 children)

Embedding ads into the stream would be hard to counter, but it's far away. That would invalidate caches along the way and need extra performance to reencode the stream with the ads inserted.

That's extra costs that are hopefully orders of magnitude above the lost ad revenue from ad blockers

[–] [email protected] 12 points 8 months ago

Ballistomancer

view more: ‹ prev next ›