![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://beehaw.org/pictrs/image/c0e83ceb-b7e5-41b4-9b76-bfd152dd8d00.png)
Looking at the logs if my Stable horde worker, more then half of requests made were to generate porn. They’d be shooting themselves in the foot regardless of if the filter worked as intended.
Looking at the logs if my Stable horde worker, more then half of requests made were to generate porn. They’d be shooting themselves in the foot regardless of if the filter worked as intended.
Randall did the math on this one: https://what-if.xkcd.com/31/
He assumes 64 GB microsd cards, if you use 1 TB ones, you could send 16 times more.
Easiest and most secure way? Mail (or hand deliver) a flash drive. That’s how they transfer data between super computers and data centers. (AWS even has dedicated trucks to do it)
No one’s gonna talk about how they turned referral links into a piramid scheme?
Hot take, C is better then C++. It really just has one unique footgun, pointers, which can be avoided most of the time. C++ has lots of (smart)pointer related footguns, each with their own rules.
pass otp. Works, more secure then SMS, open source.
Next DEFCON is in two months, can’t wait to see them get absolutely pwned.
Run the BIOS self tests.
Something’s definitely broken (TPM errors, self test errors, graphical artifacts), but I can’t tell what from the image. I would guess motherboard problems, or a subtly damaged CPU.
Could also be more then one problem in the case of over voltage (worst case consequence of PSU damage), or intermittent failure from under voltage (should be fixed with a new PSU).
Prevent subprocess from killing itself until finished.
These services, like most companies will store your data indefinitly, and can be hacked. You cound end up with your name, what ever infromation the service gave you, and contact info on the internet. This is not the end of the world, but something to be aware of.
If it’s local, try using over-the-air TV, if your close to a transmitter, you can get away with a fairly cheap antenna. (Or even just a paperclip.)
This is actually how you should declare something that you will never change, but something might change externally, like an input pin or status register.
Writing to it might do something completely different or just crash, but you also don’t want the compiler getting creative with reads; You don’t want the compiler optimizing out a check for a button press because the “constant” value is never changed.
It pings out to google constantly regardless of where you are. You should be able remove it with adb, or use an app like NetGuard to block it from acessing the internet.
Its all just weird physics and RF stuff, all they would find out is that I am a giant nerd. Some examples: common base colpitts oscillator, inductance calculator, temerature PIN detector FWHM.
I don’t think so, unless the pirate left a calling card. If you want to make sure, just make the same sheet in pirated and non pirated versions, and compare the file. (They are zip archives, so that will let you see the raw XML)
I don’t think the roof would be good at reflecting signals back at the device, it scatters them all throughout the building, rasing the noise floor. In a way, phone hotspots can cause less interference then a proper access point because they use a lower transmit power, and allow the other devices to reduce power.
I would think the metal parts of roof might be reflecting signals all around the building, which would cause interference between devices. (there is a limited number of WiFi channels), it might work better with a plastic roof, or one with RF absorbers.
Most malware is writen for Windows, but Linux malware exists, and has been found in the wild. The most common infection method, like with windows is running a trojan, theoretically things like browser exploits could also be used, but these are unlikely unless you are a high profile target like a head of state or CEO.
I would personaly be much more worried about someone evesdropping through my microphone. All they would get from my camera is my face and some glances of the room my computer is in, but my microphone would reveal all sorts of private conversations.
Yeah, I’m much more worried about someone in my country spying on me then China, like what are they gonna do from the other side of the world?