astray

joined 1 year ago
[–] [email protected] 2 points 7 months ago

Reddit is just like Digg to me now.

[–] [email protected] 2 points 7 months ago

A security module or a key fob/smart card processes the key internally using its own dedicated ram and cpu without any debugging support. This way, even something will full ram and cpu access or a compromise of your machine, there is no way to export or access the key. Data is passed to the module and it returns the scrambled or unscrambled result based on the key which no body knows or has ever seen. A key locked with no way to access can’t be hacked without physically stealing the module, which is where your pin comes in to save you. The TPM is a very important part of a secure boot chain. If you want to secure other things I wouldn’t blame you for using a separate module or fob that isn’t always connected util it’s actually needed and it should only be activated with a physical button or something so you have to be present to engage with it. This adds even more security. So you could use the TPM for boot chain security and a separate fob or data privacy for example.

[–] [email protected] 0 points 7 months ago

Why does the game mod have this much access?

[–] [email protected] 1 points 8 months ago

You’d have to pay me to look the other way and ignore security too.

[–] [email protected] 2 points 8 months ago

I wish Elon would scare away Reddit’s advertisers instead of twitter’s.

[–] [email protected] 1 points 8 months ago

You over estimate my ms painting abilities. That star would take me ages.

[–] [email protected] -1 points 8 months ago

I’m not trained in anything useful but I had a similar experience. It was like upgrading from a 720 screen to a 4k screen.

[–] [email protected] 22 points 9 months ago (1 children)

What about GLONASS, Galilleo, or BDS? Are they all being equally jammed? Why wouldn’t they sync with all of them and use a consensus to determine accuracy? Like having multiple ntp servers.

[–] [email protected] 43 points 9 months ago (4 children)

Use root to create new user, then run app as new user.

[–] [email protected] 3 points 10 months ago (1 children)

They stopped caring about your ip address and have moved to profiling, so they’ll gladly help you change your ip address to get more from you.

[–] [email protected] 0 points 10 months ago

Or you could use a separate key on each device.

[–] [email protected] 2 points 10 months ago

You could configure the sip phones to point directly to one another. No pbx needed. Just “call” and ip address. You only need the pbx to translate/authenticate/provide features. Sip invite comes into phone, making phone ring, pickup phone, and rtp goes directly to phone just like the sip invite. so long as there are no translations causing issues in between, so it actually works best on a private direct network between them.

view more: next ›