- Jun 2024
-
thecreativeindependent.com thecreativeindependent.com
-
We’re encouraged just to talk about ourselves and our feelings towards others. We’re not encouraged to see ourselves as part of anything
Just part of companies. Customers and Employees.
-
you have to start with where power has gone. It’s very difficult to see
See where the Power has gone ...
-
- Mar 2024
-
wiki.linuxfoundation.org wiki.linuxfoundation.org
-
anyone can modify the code anytime
??? Just try to modify the Linux Kernel source code and you may be banned https://www.theverge.com/2021/4/30/22410164/linux-kernel-university-of-minnesota-banned-open-source
-
super long term support (SLTS)
Easing upgrades might be a better objective
-
- Jul 2023
-
source.android.com source.android.com
-
One way of verifying a block device is to directly hash its contents and compare them to a stored value. However, attempting to verify an entire block device can take an extended period and consume much of a device's power. Devices would take long periods to boot and then be significantly drained prior to use. Instead, dm-verity verifies blocks individually and only when each one is accessed. When read into memory, the block is hashed in parallel. The hash is then verified up the tree. And since reading the block is such an expensive operation, the latency introduced by this block-level verification is comparatively nominal.
This is the performance benefit to using dm-verity.
-
- Dec 2022
-
www.theatlantic.com www.theatlantic.com
-
Online life is all about maximizing the quantity of connections without much concern for their quality.
? Pure speculation.
-
-
www.theatlantic.com www.theatlantic.com
-
sociopathy is a design philosophy
Typical Tweet style :-)
-
- Feb 2022
-
bookshop.org bookshop.org
-
It is a regime that prioritizes individual success over collective flourishing. It refuses to recognise anything - job, place, person - that is not profitable.
Curious to see the argument here
-
-
-
We need to forget, but we first must feel safe forgetting.
That is the limit: if you are convinced your note-taking app is as good as a trash can, then no safe feeling for you. No "mental safety to forget". Still you have helped your real brain to remember via the writing process. That is not loss.
-
-
-
we have persuasive technology pointed at more than three billion minds, optimizing for advertising revenue and addiction. It undermines human dignity and freedom at the most basic level: the agency to direct our attention towards what’s important to us. At this scale and pervasiveness, it damages our well-being and productivity, and it debases our shared capacity for solving the world’s hardest problems. It’s sick. It’s disrespectful of the human spirit. And I believe there’s a good chance that future generations will literally judge this as crimes against humanity.
Quite violent. But it reflects what people feel about "Attention Economy". The violence and the pain is a recurring theme from those who try to escape.
-
- Jan 2022
-
source.android.com source.android.com
-
One way of verifying a block device is to directly hash its contents and compare them to a stored value. However, attempting to verify an entire block device can take an extended period and consume much of a device's power. Devices would take long periods to boot and then be significantly drained prior to use. Instead, dm-verity verifies blocks individually and only when each one is accessed. When read into memory, the block is hashed in parallel. The hash is then verified up the tree. And since reading the block is such an expensive operation, the latency introduced by this block-level verification is comparatively nominal.
This is the performance benefit to using dm-verity.
-
- Nov 2021
-
docs.google.com docs.google.com
-
The schema in "Types of Protectors" page 8, it should be "Unwrap key ..." and not "Unwrapped key ..."
-
-
www.linaro.org www.linaro.org
-
A full-featured software TPM is a large and complicated software stack
To the point of being a security risk. Some TPM had vulnerabilities due to the number of functions and their complexity to implement.
-
- Aug 2021
-
orionmagazine.org orionmagazine.org
-
visitors toured Democracity, a metropolis of multilane highways that took its citizens from their countryside homes to their jobs in the skyscraper-packed central city
Democracity ...
-
advertising agency told readers that under “private capitalism, the Consumer, the Citizen is boss,” and “he doesn’t have to wait for election day to vote or for the Court to convene before handing down his verdict. The consumer ‘votes’ each time he buys one article and rejects another.”
To be linked with the following paragraph where he explain how marketing and advertising, the "invisible government" drives the "citizen" more like a dog than a "boss".
-
- Apr 2021
-
-
Shows that there is a balance to be found between keeping everything secrets and giving some insight.
Some information are more useful for security than for attackers
-
OAuth access tokens are now 178
The 40 characters were all random, but now:
- 4 first characters are "ghX_"
- 6 last are the CRC32
Total: 10 non-random characters.
But they allowed uppercase characters in the random string, hence the total entropy is higher, even if only 30 characters are random instead of 40.
-
-
blog.assetnote.io blog.assetnote.io
-
Data collection
How they collected the API definitions over the Web is impressive. Big data at play.
-
found that it was actual a local file read vulnerability
A HTTP 301 indicating local file read vulnerability. Good point.
-
Mostly Blackbox testing, where you do not already have the API definition. (or you do not trust that your documents match what is really implemented).
-
content discovery tooling
All the tools relate to fuzzing
-
ffuf with a large wordlist
Fast web Fuzzer
-
-
inthesetimes.com inthesetimes.com
-
Via https://www.densediscovery.com/issues/133 Not the best article on the subject.
-
2014 study found that one in 10 people in the United Kingdom did not have a close friend; in a 2019 poll in the United States, one in five of the millennials surveyed reported being friendless
Does not seem very scientific ...
-
-
www.noemamag.com www.noemamag.com
- Apr 2020
-
github.com github.com
-
Only providing shortcuts is not really useful. Better remember the true command.
-
- Jan 2019
-
programminghistorian.org programminghistorian.org
-
Interesting resource.
-
-
mermaidjs.github.io mermaidjs.github.io
-
Generation of diagrams and flowcharts from text in a similar manner as markdown. PlantUML equivalent in Javascript
-
- Jun 2016
-
bitcoinmagazine.com bitcoinmagazine.com
-
We see plans like the R3 Consortium as a counter-productive grab to maintain centralized control. There are already reports and rumors that things aren't going according to plan.
-
As a conclusion, it's better to rely on a private blockchain than no cryptographic system at all. It has merits and pushes the blockchain terminology into the corporate world, making truly public blockchains a bit more likely for the future.
-
Bitcoin Magazine spoke with some well-known blockchain thinkers on their opinions of what the uses for a private blockchain might be.
No use cases, but conflicting opinions from experts
-
they are totally orthogonal, both can coexist in the same time, and therefore there is no need to oppose them as we can often see it.
-
The consortium or company running a private blockchain can easily, if desired, change the rules of a blockchain, revert transactions, modify balances, etc. In some cases, e.g. national land registries, this functionality is necessary
-