rektifier

joined 1 year ago
[–] [email protected] 13 points 11 months ago* (last edited 11 months ago) (1 children)

Following the breach, NXP reportedly took measures to boost its network security. The company enhanced its monitoring systems and imposed stricter controls on data accessibility and transfer within the company.

This is the real damage. China is establishing a surveillance culture in the west. By threatening to hack our computers, they hacked our culture instead.

I work at a company that is doing more and more security controls and it's sad to see the culture of openness get chipped away little by little by this.

[–] [email protected] 3 points 1 year ago

and GNOME 3 too

[–] [email protected] 1 points 1 year ago

Even if they have the source, they may not have all the build tools anymore.

Or they have the build tools but the wizard that set up the build system back in the day no longer works there.

Or they have the build system archived and documented but it doesn't run because some license expired, and the tool vender doesn't sell that version anymore.

In the near future, there will be another possibility - SaaS cloud tools that are impossible to preserve so they are forever lost.

[–] [email protected] 1 points 1 year ago (1 children)

Wasn't facebook also found to store images that were uploaded but not posted? This is just a resource leak . I can't believe no one has mentioned this phrase yet. I'm more concerned about DoS attacks that fill up the instance's storage with unused images. I think the issue of illegal content is being blown out of proportion. As long as it's removed promptly (I believe the standard is 1 hour) when the mods/admins learn about it, there should be no liabilities. Otherwise every site that allows users to post media would be dead by now.

[–] [email protected] 2 points 1 year ago (2 children)

This must be BS or a regional thing. All the RCA ports I've seen in North America are labeled L and R, not L+R and L-R.