What this? The user to user or device encryption? From the article, it seems that they stand also against device scanning.
End to end encryption means user to user.
Not a local storage… Your example is just an encrypted storage, there is no end.
Misspelling
Reduce reuse recycle. Seems to be an interesting material for reuse.
Tho I don’t know what to think about it for ecology. The material would most like still get into common trash and thrown into the wild.
Only 25% degradation in the ocean is conflicting. If the resin remains and cannot be degraded, well it’s still pollution like plastic.
What happens to the material is burned in a trash incinerator? Does it release bits of resin in the air like plastic?
or when in the wild under rain or dirt?
Tho it still seems to be an interesting material which may allow for a easier repair or recicling of road material.
I’m not sure if I understand this very well, and how small these could be built.
But let’s look at the computer cpus. It maybe would allow for a better heat management in these chips.
When a cpu is designed, the engineers have no idea where the hot-spot is. After plenty of testing, a general spot for a termal probe would be found. However that spot may not be the real hot spot, due to limitations in the design and other factors, like the uneven dissipation of heat in the chip. So there is a tollererance used to prevent the chip from burning itself.
Maybe these thermal transistors could transfer the heat where it really matters and even out how the head gets out of the cpu, which would possibly enhance that heat management and get better results.
I don’t remember exactly where this cpu temperature probe limitation was discussed. It would be in one of these 2 videos from Der8auer :
Well what if I’m just not inteterested in YouTube music (just because I don’t listed to a lot of music)?
It does make the deal a lot worse.
I don’t understand your ranting about mozzila. In the wiki page you posted right there :
Any profits made by the Mozilla Corporation will be invested back into the Mozilla project. There will be no shareholders, no stock options will be issued and no dividends will be paid
Where is the profit on the page? The revenue isn’t profit, it’s how much money they make without the costs.
Then how do you expect a browser to survive without revenue? There are 3 major browser engines on the market today :
Al of them suck up huge amount of money.
For revenue, they also have more products than Firefox https://en.m.wikipedia.org/wiki/List_of_Mozilla_products which also make money or not.
Yep. And the average user doesn’t know what a bios update is.
Oh and the average user doesn’t know that windows update has bios updates from manufacturers.
What happens when the bios is flashed? Poof the key disappeared…
Nice move Microsoft. Not sure if they have something to prevent the loss of the encryption key or some security, but for those people I hope they don’t loose their data due to updates.
Did you even read the article?
The configuration has a powerful cpu and fast ssd. There are multiple benchmark tools used, and 2 encryption methods, software and hardware.
I’m using windows pro, because of hyperv, and gpu virtualisation. And I don’t need that security feature.
And windows pro still have some benefits. The group policy, tho most of the changes can still be made in the registry.
Am I mistaken, or did you want to say 50mbps and 10mbps? 50gbps seems way above what a wireless network can do.
For a vpn, your connection through wireless or fiber is exactly the same. The city only provides the fiber infrastructure. When you get Internet, it’s through a provider which will use their equipments and main network (they link their network to the city infrastructure, using their devices. At least, it’s how it works in France). Unless the provider is the city.
Tho I guess that providers do give data to the state so whatever the case, it would be the same thing.
Well it depends.
Just from the subject: are mobile photos real
(to simplify this and avoid a definitive no, well not talk about photos beeing real or not in numeric form).
Photography is a complicated topic on mobile phones, with plenty of algorithms enhancing what a tiny sensor can deliver.
Are my photos real because they represent what I see at one precise point in time? Because it is what I remember something was?
Or are they not real because of the algorithms interpreting the results to make it look like I see it?
Now are these photos real?
They change what I see, but would that make them less real for you/me? How do you see your pictures?
about the article : When ai/photography manipulation is brought in the question, in order to change the first result :
It could slightly change colors, then I guess we could maybe comme back to above, is this interpretation real or not? More or less real?
It could be a modification of what and how elements appear in that picture. Here, for me, there isn’t any question. The reality of the pictures are completely broken as they do not represent anymore what I could see.
It is not for the password manager…
It’s just to connect to the google account.
It is not a service to connect to other ones without passwords.
So first, no, all the files should not be accessible : There are special not “files”, but keys, like the key used for this method. These keys pose a huge security risk of they are leaked somehow. The key can be something used to encrypt the device/disk, encrypt a connection, and other things associated with encryption.
And because of that security risk, they are often stored in a special chip or simulated chip (like the simulated tpm 2.0 on pc cpu), and not just “stored” so any malware or who knows what can access them just by reading the drive.
Second, the key is never transfered. When you connect to another device, that other device will get another key. Or maybe could it be backed up somehow in case of recovery on another phone? But that would defeat the entire purpose of this.
How Google can do to allow you to connect to another device if the first one is lost, not sure. But it would certainly either ask for a password and a 2fa method.
And it’s expected as you still had that device. And it’s not the same key, a new key has been created for that new device. Now if that device cannot be accessed?
Nothing of that?
You don’t need to export or know what is the key.
The key is different for each device.
You won’t need to?
The key is for a single device. Logging in on another one is going to generate another key.
They key is secured with the pin of the device, so when you try to log in, you can use the pin to log in, and not the password.
It can be cracked in less than a second?
If someone never loses their phones, laptop… Maybe it’s secure.
But if someone steals it, how secure can it be? Is the key protected by the pin encryption? If so the encryption is now useless.
Here is a French video about Micode interviewing the French DGSE : https://youtu.be/g_jEz6aF2b4?si=-sUAIvDf4F7-7kGc
They crack the phone security in 4 seconds with the pin beeing : Mic0rp2022. The software used is hashcat, an open source tool.
This meme looks ai generated.
Scam/wish text is back and some elements looks off in the picture (hand, eyes teeth…).