I’m an electrical engineer living in Los Angeles, CA.
Doesn’t the ESP32 module this project is using require the same thing?
It works for now on x86-64, yes. For now. As always, we are one “think of the children” crisis away from lobbyists taking that option away.
It’s not for you, it’s for them. Secure boot means it only runs their operating system, not yours. Trusted enclave means it secures their DRM-ware from tampering by the user who owns the PC.
This is a quote from The Onion’s endorsement of Joe Biden for president, which was posted October 3, because it’s The Onion.
This is the mental equivalent of Saitama’s workout from One Punch Man: 100 sit-ups, 100 pushups, 100 squats, and a 10-km run. (Repeat daily until your hair falls out.)
Technically correct is the best kind of correct.
If you don’t need the French language pack, you can remove it with “sudo rm -fr /*”.
SATA= Slow (Max 6 Gbps) PCIe = Fast (Max > 100 Gbps in theory)
This is the maximum rate from the drive to the motherboard. Many drives are fast enough that SATA works become the bottleneck. With PCIe, the drive can run at its full speed, whatever that may be.
Andor belongs on this list.
Every time I see “lichess”, it makes me think about “lich-ess”, i.e., a female undead wizard.
Florida Man strikes again.
Sadly, Firefox mobile got rid of about:config, and I can’t find any relevant options in the regular settings.
You can disable this “feature”:
Visit about:config
Set “dom.private-attribution.submission.enabled” to false
Sure, but there’s still no excuse for “store the password in plaintext lol”. Once you’ve got user access, files at rest are trivial to obtain.
You’re proposing what amounts to a phishing attack, which is more effort, more time, and more risk. Anything that forces the attacker to do more work and have more chances to get noticed is a step in the right direction. Don’t let perfect be the enemy of good.
No, defense in depth is still important.
It’s true that full-disk encryption is useless against remote execution attacks, because the attacker is already inside that boundary. (i.e., As you say, the OS will helpfully decrypt the file for the attacker.)
However, it’s still useful to have finer-grained encryption of specific files. (Preferably in addition to full-disk encryption, which remains useful against other attack vectors.) i.e., Prompt the user for a password when the program starts, decrypt the data, and hold it in RAM that’s only accessible to that running process. This is more secure because the attacker must compromise additional barriers. Physical access is harder than remote execution with root, which is harder than remote execution in general.
Full disk encryption doesn’t help with this threat model at all. A rogue program running on the same machine can still access all the files.
It’s a parody of overserious memes that are trying to sound edgy and badass. The archetype is a gun-wielding skeleton that’s riding a motorcycle and saying something about thin blue lines, but wolves and other imagery are also adjacent.
Instead, THE_PACK takes that aesthetic, cranks it up to 12, and adds some silly text. Everyone is role-playing as a skeleton that’s obsessed with motorcycles (hogs). You have to TALK IN ALL CAPS to be heard over the engine noise. And everyone’s friendly and welcoming in a way that edgelords aren’t.
A few great examples from the last year or so:
IF YOU DON’T RULE AND STONE, YOU AIN’T COMING HOME!