

Even if that’s all true, it’s not evidence that the end to end encryption is broken.
That sort of debug access could simply be included in the clients.


Even if that’s all true, it’s not evidence that the end to end encryption is broken.
That sort of debug access could simply be included in the clients.


A movie is not software. It can’t control the device you own.
Ha you have no idea. They use new BluRay releases to distribute key revocation databases that block your BluRay drive from decrypting disks with older host keys.
Edit: I suggest starting here if you want to know more: https://wiki.archlinux.org/title/Blu-ray


Grid scale storage doesn’t strike me as an area of application where high energy density is important, so wouldn’t batteries with less conversion loss do an overall better job? I think grid scale Lithium-ion battery stores have become somewhat common.
I’d see gasoline from CO2 capture of interest more for airplanes, drones, ships, maybe even certain modes of long haul terrestrial transport where weight and volume is important.


The article speaks of a “Windows 365 suite of productivity apps” but that doesn’t exist.
There is the “Microsoft 365” suite of office apps, and there is the “Windows 365” offer of a Virtual Machine as SaaS.
It seems the thing that went down was the former and the ill timed announcement concerned the latter.


Still a good idea for specific cases though. An example from current news close to me: We have line ships on lake Zürich that can’t be electrified because either they are too old to sustain a major internal rework or, for some, they can’t carry the battery weight.
For a case like that I’d prefer if they put some CO2 capture stations up to keep running the ships rather than scrapping them prematurely.
… if the capture stations work, that is. Can’t trust the word of a startup too much.


You gotta get on Alan Wake 2.
Bit cruel after they just said they can’t run it 😄


I’m just wondering how many devices still use dedicated TPMs, instead of the ones integrated in the SoC by AMD and Intel. Sniffing a bus inside the SoC must be significantly harder or impossible.


Or Swiss, it sounds very familiar. My French sucks. I did get DELF B2 level at the time, but damn do I struggle when I need to work in Lausanne with locals nowadays.
Especially in zombie survival movies. Except in Zombieland, there it’s just the sister I think.


Can confirm, Firefox with uBlock Origin works. The OS doesn’t seem to matter. I use that combination on Linux (Fedora 43), Windows (10), macOS (15) and Android (16), no YouTube ads anywhere.


on YouTube (on my TV, still need to get a piHole up and running
Unfortunately that won’t help. The Youtube ads are served from the same domains as the videos, so a DNS based blocker is inherently powerless.


That was a rhetorical question after I pointed out the inconsistency: The author claimed they keys were for verification and then also said they were used to decrypt.
That’s most likely bullshit, and if it isn’t they should explain the unusual setup in detail instead of glossing over it.


Yeah agreed especially further down when it’s just randomly rehashing old history. It’s also mixing up decryption and verification even in the beginning of the article. First they write:
BootROM (Level 0): The CPU runs code burned into it at the factory. This code is immutable (cannot be changed). It uses the ROM Keys to verify the signature of the next loader.
Then just two paragraphs below:
The ROM Keys change everything. With these keys, hackers can decrypt the Level 1 Bootloader.
So which is it? Usually bootloaders in a chain hash the next stage. That hash is compared with the signed hash the stage presents, and the signature on the signed hash is cryptographically verified against the locally stored trusted keys. No encryption or decryption takes place. Maybe this is different for the PS5 but then that would be noteworthy, not something you just assume readers to know.


Since the graphic is counting sales in units sold I guess free to download “live services” wouldn’t really appear.
Would be interesting to see the same counting revenues.


Good analogy. It also brought to mind the bumpers you can enable for kids in bowling.


When I was a child I used to ask my dad to input the invulnerability cheat in Doom. I was way too bad at movement, aiming and basically just everything, that I could have had fun otherwise. Likewise for Anno 1602, there I needed the money cheat because otherwise I’d just go bankrupt. I didn’t understand the income balance yet but I still had fun building economy chains.
I’m not sure I have a point here. Just remembered cheating as a child because I needed it. Probably haven’t cheated in 18 years now.


Yeah they are fun!
Also pretty easy I’d say.


Two that I run for our little group outside the ones you mention are Space Engineers and Valheim
Edit: Space Engineers is a little annoying though, you either have to use some emulated / translated setup, (I think I saw some being cobbled together by others), or you have to run a Windows Server VM.


I wonder how long it will take until they all start using DoH and conveniently make the TV fail if it’s blocked…
I understand perfectly well, it’s you who doesn’t.
If the illegitimate access happens on the client which is the endpoint of the e2e-encryption then it doesn’t say anything about the e2e-encryption working or not working. On the endpoint the content is always available decrypted, for user consumption