It’s asking me for a password. OMG why doesn’t it know it’s me and do what I tell it.
- randomGeneratedUsername
It’s asking me for a password. OMG why doesn’t it know it’s me and do what I tell it.
I have been burnt too many times by vendor incompatibility at work to not read the manuals before deploying something.
They got rid of that years ago though.
Do EV and OV certs actually provide additional useful? When was the last time you reviewed the certificate of a site you access for non work purposes?
They are bound by anti money laundering laws (AML) and are required to Know Your Customers (KYC).
https://support.kraken.com/hc/en-us/articles/know-your-customer-kyc-questionnaire
Yes it does compromise privacy because now when the exchange is asked who owns this wallet they have to hand your details to law enforcement.
Exchanges without KYC are getting rarer.
from the still they are doing can you break glass with your voice myth.
High speed cameras use a lot of bandwidth a 1080p 60fps is about 4Mb/s. now imagine a 1080p at 2000fps. you need a bit of guts to store and process that
Doesn’t DoH and DoT completely kill this?
Might throw some off but that is NetBios and things will totally go for that because Windows is terrible for security.
All my stuff avoids anything below 1000 or that ends in 22 because most people will just go 2222 or 1022. pick a random number between 1001 and 65000
I took a poke at the abstract of the paper, https://www.nature.com/articles/s41586-024-07759-5, and its been a few years since I have done carrier grade wireless but…
The low-loss and broadband beamformer enables a 72-Gbps chip-to-chip wireless link over 300 mm and eight simultaneous 40-Gbps wireless links
I can’t be reading this right? They got 72Gb/s over 30cm?
I would love to see where this tech goes and I realise these papers are using ideal circumstance, but I don’t see this being used in a meaningful way.
Hope I am wrong though.
assuming they are not behind a CGN whitelisting your mates place should be OK. But I would also move SSH away from a well known port. In the event something happens to the whitelist, crawlers will not jump on you straight away.
In an absolute sense, yes a modem can spy on you by hijacking requests and redirecting them to controlled locations. We use TLS to prevent this, even stronger with technologies like HSTS.
Does this happen in real life though? More then you think, but less of an impact then you think.
Some US providers will hijack DNS requests and redirect them to their own DNS servers, but this can be solved with DOH or DOT.
TLS interception is a thing but it requires the device you are using (phone, PC, tablet, laptop) to have a root certificate installed that the ISP also controls. Almost all browsers will only install root certificates from root certificate providers with good standing and have no quarm in untrusing the root certificate if things go badly.
Windows can’t even get their own UI right.
Look at the win10 control panel. Nearly a decade later and we still have to use the classic control panel to change settings.
Let’s flip this question. Why do you think an organisation should get my data?
Are they reputable? Are they secure? Are they domiciled in my country and follow the laws of my country?
Odd that they would go for the Danish version of /r/watchitfortheplot and not the English one.
Giving the convent back their bomb.
Boot a PC with no hard drives with a live CD so there is no storage to write to. connect the drive and see what there is.
Oh no, who cares, carry on with your life if a website deleted comments.
Replacing the UPS batteries is required maintenance.
Compare the cost of new batteries to a new UPS and realise it’s the cheaper option.
Honestly, ewaste center.
Not much an atom with a gig of ram can do.