Not sure what you are saying. With the order of the meme reversed it doesn’t make it obvious which point is supposed the clearer point of view…
Not sure what you are saying. With the order of the meme reversed it doesn’t make it obvious which point is supposed the clearer point of view…
Zettai ryōiki, the absolute territory, is the area between skirt and over the knee socks


Nowhere in the given scenario do secret keys leak.


I understand perfectly well, it’s you who doesn’t.
If the illegitimate access happens on the client which is the endpoint of the e2e-encryption then it doesn’t say anything about the e2e-encryption working or not working. On the endpoint the content is always available decrypted, for user consumption


Even if that’s all true, it’s not evidence that the end to end encryption is broken.
That sort of debug access could simply be included in the clients.


A movie is not software. It can’t control the device you own.
Ha you have no idea. They use new BluRay releases to distribute key revocation databases that block your BluRay drive from decrypting disks with older host keys.
Edit: I suggest starting here if you want to know more: https://wiki.archlinux.org/title/Blu-ray


Grid scale storage doesn’t strike me as an area of application where high energy density is important, so wouldn’t batteries with less conversion loss do an overall better job? I think grid scale Lithium-ion battery stores have become somewhat common.
I’d see gasoline from CO2 capture of interest more for airplanes, drones, ships, maybe even certain modes of long haul terrestrial transport where weight and volume is important.


The article speaks of a “Windows 365 suite of productivity apps” but that doesn’t exist.
There is the “Microsoft 365” suite of office apps, and there is the “Windows 365” offer of a Virtual Machine as SaaS.
It seems the thing that went down was the former and the ill timed announcement concerned the latter.


Still a good idea for specific cases though. An example from current news close to me: We have line ships on lake Zürich that can’t be electrified because either they are too old to sustain a major internal rework or, for some, they can’t carry the battery weight.
For a case like that I’d prefer if they put some CO2 capture stations up to keep running the ships rather than scrapping them prematurely.
… if the capture stations work, that is. Can’t trust the word of a startup too much.


You gotta get on Alan Wake 2.
Bit cruel after they just said they can’t run it 😄


I’m just wondering how many devices still use dedicated TPMs, instead of the ones integrated in the SoC by AMD and Intel. Sniffing a bus inside the SoC must be significantly harder or impossible.


Or Swiss, it sounds very familiar. My French sucks. I did get DELF B2 level at the time, but damn do I struggle when I need to work in Lausanne with locals nowadays.
Especially in zombie survival movies. Except in Zombieland, there it’s just the sister I think.


Can confirm, Firefox with uBlock Origin works. The OS doesn’t seem to matter. I use that combination on Linux (Fedora 43), Windows (10), macOS (15) and Android (16), no YouTube ads anywhere.


on YouTube (on my TV, still need to get a piHole up and running
Unfortunately that won’t help. The Youtube ads are served from the same domains as the videos, so a DNS based blocker is inherently powerless.


That was a rhetorical question after I pointed out the inconsistency: The author claimed they keys were for verification and then also said they were used to decrypt.
That’s most likely bullshit, and if it isn’t they should explain the unusual setup in detail instead of glossing over it.


Yeah agreed especially further down when it’s just randomly rehashing old history. It’s also mixing up decryption and verification even in the beginning of the article. First they write:
BootROM (Level 0): The CPU runs code burned into it at the factory. This code is immutable (cannot be changed). It uses the ROM Keys to verify the signature of the next loader.
Then just two paragraphs below:
The ROM Keys change everything. With these keys, hackers can decrypt the Level 1 Bootloader.
So which is it? Usually bootloaders in a chain hash the next stage. That hash is compared with the signed hash the stage presents, and the signature on the signed hash is cryptographically verified against the locally stored trusted keys. No encryption or decryption takes place. Maybe this is different for the PS5 but then that would be noteworthy, not something you just assume readers to know.


Since the graphic is counting sales in units sold I guess free to download “live services” wouldn’t really appear.
Would be interesting to see the same counting revenues.


Good analogy. It also brought to mind the bumpers you can enable for kids in bowling.
The entire article is based on a false premise:
Not true, there are three years of ESU updates available.