It works for now on x86-64, yes. For now. As always, we are one “think of the children” crisis away from lobbyists taking that option away.
I’m an electrical engineer living in Los Angeles, CA.
It works for now on x86-64, yes. For now. As always, we are one “think of the children” crisis away from lobbyists taking that option away.
It’s not for you, it’s for them. Secure boot means it only runs their operating system, not yours. Trusted enclave means it secures their DRM-ware from tampering by the user who owns the PC.
I’m speculating, but my guesses are:
Once mature, it’s usually used for spam or astroturfing. There is a noticeable uptick around big elections, wars, etc.
I saw one repost-bot that metastisized into the most vile porn-spam-bot you can imagine, but they’re usually more subtle than that.
The beard really brings this meme together. Rock and stone!
They’re indistinguishable because they’re copied from top-voted posts that are a few years old (title, text, and image if applicable). It’s guaranteed to produce a post that fits the community and gets a lot of engagement, so it’s a cheap and effective way to mature a bot account. Once you start looking for it, it’s everywhere, and Reddit admins don’t care.
The healer in Tactical Breach Wizards is a necromancer, so she can only fix you up once you’re dead. She carries a .45 for medical purposes.
It’s like Pokemon. You only get four skill slots.
Andor belongs on this list.
AOC for President.
Sure, but there’s still no excuse for “store the password in plaintext lol”. Once you’ve got user access, files at rest are trivial to obtain.
You’re proposing what amounts to a phishing attack, which is more effort, more time, and more risk. Anything that forces the attacker to do more work and have more chances to get noticed is a step in the right direction. Don’t let perfect be the enemy of good.
No, defense in depth is still important.
It’s true that full-disk encryption is useless against remote execution attacks, because the attacker is already inside that boundary. (i.e., As you say, the OS will helpfully decrypt the file for the attacker.)
However, it’s still useful to have finer-grained encryption of specific files. (Preferably in addition to full-disk encryption, which remains useful against other attack vectors.) i.e., Prompt the user for a password when the program starts, decrypt the data, and hold it in RAM that’s only accessible to that running process. This is more secure because the attacker must compromise additional barriers. Physical access is harder than remote execution with root, which is harder than remote execution in general.
I’m looking at you, Olórin, Mithrandir, Incánus, Tharkûn, Greyhame, Stormcrow, Láthspell, and/or Gandalf.
Is this why Ian McCollum’s videos are getting altered? Over the years, he’s had many historical deep-dives featuring firearms from the Murphy’s auction house. In recent months, he’s been re-uploading those videos to cover their logo with the word “Morphy’s”. Even though the auctions are long over, I suppose Google counts them as promoting sales.
Death Defiance: Upon taking lethal damage, instead briefly become invulnerable and restore 50% HP.
Hook those coffins up to generators for infinite free electricity.
Phase 1: Fuck around
Phase 2: Find out
Those fish know what they did.
Problem: Large studios aren’t winning awards, because their products aren’t as creative as smaller studios.
Microsoft solution: If you buy up all the small studios and close them down, then the awards will have to go to large studios, because there are no small studios.
Result: Line go up stonks.
Doesn’t the ESP32 module this project is using require the same thing?