Not quite the same, but in WoW, you couldn't talk to the opposing faction. So sometimes people would make characters like this just to hang out in the other faction's zones and communicate using only emotes. Good times...
teawrecks
I remember when the mapping of virtual memory segments clicked for me. I think i said out loud, "that's so clever!". Now it just seems so fundamental to managing memory for user space applications, but I hadn't thought about how it was done before.
Immich is a self-hosted photo hosting service. They're listing this in their docs because people are trying to upload photos with GPS data, hitting this cursed behavior because they didn't give immich Location access (because why would you?), and then filing unnecessary bug reports on them about their disappearing data.
To be clear, no one is against stripping GPS data, that's not what anyone takes issue with, it's the silently part that is unexpected behavior.
It's cursed because it happens silently, such that you might accidentally be deleting gps data you wanted to keep without noticing, for a reason that you probably wouldn't think to check, probably instead erroneously filing a bug on the app for doing it.
As someone who majored in CS and is now in a software engineering position, the people in tech who come from a completely different field are always my favorite. On top of just proving people wrong about the "right" way to get into the field, they've been around, they know how to think about problems from other perspectives, and they're usually better at working with other people.
Honestly, I think more people should minor in CS, or if they did their undergrad in CS, they should have to do their grad work in something else. The ability to compute things is only useful if you're well versed in a problem worth computing an answer to, most of which lie outside of CS.
they say the 30s is generally where your love for video games go to die.
Such a claim is baseless. Video games have been evolving every few years for their entire existence. Such a claim sounds as ridiculous as someone in the 60s saying that people grow out of watching animated shows in their teens.
Either your priorities have just shifted, or you might be in a bubble where you only see the same old games that have already been done, so nothing piques your interest.
I'm actually not sure what TPM can guard against, but I think you're right, I think if a malicious OS borked with the bootloader, TPM would catch it and complain before you decrypt the other OS.
Yeah, physical access usually means all bets are off, but you still lock your doors even though a hammer through a window easily circumvents it. Because you don't know what the attacker is willing to do/capable of. If you only ever check for physical devices, you'll miss the attack in software, similarly if you only rely on Secure Boot you'll miss any hardware based attacks. It's there as a tool to plug one attack vector.
Also, my guess is the most common thing this protects against are stupid employees plugging a USB they found in the parking lot into their PC. If they do it while the OS is running, IT can have a policy that blocks it from taking action. But if they leave it there during a reboot, IT is otherwise helpless.
No point in putting locks on your house, because an attacker can just drive their car through your front door.
The attacks you mention have their own ways of being detected: usually eyeballs. But eyeballs can't help you against something hiding in your bootloader. So Secure Boot was made.
And I don't really follow your dual boot claim. If you don't trust one of the OSes, and you boot it up on your hw, you're already hosed. At that point it can backdoor your bootloader and compromise your other OS. Secure Boot prevents malicious OSes from being booted, it can't help you if you willingly boot a malicious OS.
Totally agree that the first one's gameplay doesn't hold up. The second is a HUGE step up. Night and day difference.
Cool, that's a good source to peruse, thanks.
Yeah, afaik the tegra was only used for embedded, closed source devices though, no? Did they submit any non-proprietary tegra support upstream?
And afaik CUDA has also always been proprietary bins. Maybe you mean they had to submit upstream fixes here and there to get their closed-source stuff working properly?
Dumpster fire or not, it doesn't let you actually see recent posts unless you're signed in anymore. So all the public services that use it (or Facebook) to make public statements are inaccessible.
IMO the US should start a .gov mastodon instance for these types of accounts. Moderation might be a challenge given that there's a fine line between censorship on a private platform, and infringement of free speech on a publicly funded one, but I think we'll need to figure it out eventually.