• 0 Posts
  • 122 Comments
Joined 1 year ago
cake
Cake day: July 23rd, 2023

help-circle



  • It’s a much higher risk than average because games are often abandoned within one year of release and still run as long as 10-15 years later and connects to the internet and other randos on the internet. See the Call of Duty games that allow you to take over the computer of anyone who connects to your online match. It greatly degrades the security of its users.

    Technically lots of things people call “malware” don’t actually do any of those things. For instance they may hijack your default search engine, pop up ads, or otherwise monetize your computer at your expense. The category that was invented by ass coverers is “possibly unwanted program” but outside of those who worry about being sued by scumbags people colloquially refer to both what you call malware AND PUPs as "malware the root of which is “bad” after all. Language being descriptive not prescriptive I think this broader definition of malware is fine.








  • Yes any country that hosts a terrorist militia should both shut it down and make peace with its neighbors. Israel should offer peace in exchange for all hostages and a lawfully administered democratic Palestinian state protected by the UN but without arms for a period of time. Unlawful Israeli settlements should be ceded to this state.

    All these things are worth doing and benefit everyone except hard liners on both side which have aspirations that range from unlawful to unrealistic.

    Instead of achieving any extreme ends of either party the results of current strategy is likely to be a permanent state of suffering that will directly or indirectly harm millions. Their lifes and times are worth saving.


  • In what universe can a 100,000 man army launch attacks against your neighbor whilst operating out of your home country funded and manned by your nation and not be at war?

    It would be like having the Texas national guard launching rockets into Mexico. The US and Mexico would be at war. Proxy war as a sub for actual war only works when you are strong enough your adversary is disinclined to respond to your provocation. Imagine hiring goons and visibly directing them to break your neighbors windows and thinking that you can stay out of the scuffle.

    Critique Israel all you like and I do as well. I don’t feel like Lebanon has any right to complain that Israel is striking them. They should commit to stopping the attacks and they and Israel should make peace.




  • There are a few fundamental differences here.

    One: the existing hardware isn’t lacking anything functional that the user requires. While it may be more secure implemented with TPM 2.0 its far from a hard requirement. After all bitlocker works on 10. The fact that you can presently work around it suggests the limitation is imposed from on high not a hardware requirement.

    Two: The hardware isn’t all that old. General duty cycle on a phone is around 3 years, about 6 years on a PC. Apple has dropped support for 6 year old phones and 10 year old PC. Especially because intel continues to manufacturer a given CPU long after launch and OEMs continue to integrate them people are going to find machines that they bought new off the shelf within the last 3 years unsupported which unlike a 10 year old Mac feels like a rug pull.




  • Fridges with computers in them but we someone missed the boat on pervasive RFID in food containers and maintaining in stock of my shit. It should be able to tell my milk is 1/4 full and 2 days from expiration and add it to an order that shows up when my calendar says I’ll be home but no what do we get? Something with 1/2 the lifespan which can play youtube videos and show you how much beer you have from the couch from its webcam.

    Why even bother.


  • They actually do use software to find deniable claims that would theoretically have to be reviewed by a doctor. The doctor pulls up a while page of to be denied claims and theoretically gives them the legally required review all at once in the 30 seconds before he hits the button. There is no reason NOT to feed propensity to accept fake denial into the equation. You could even white wash it by presuming that prior denials that stuck were indication of bad claims and assert you are measuring their proclivity for filing wasteful claims.