And in recent years, VPN abuse by malicious actors has gone WAY up. Well, either that or the ability for InfoSec practitioners to trace the threat actor back to the VPN has gone up. Or a combination.
And in recent years, VPN abuse by malicious actors has gone WAY up. Well, either that or the ability for InfoSec practitioners to trace the threat actor back to the VPN has gone up. Or a combination.
Well, any game has at least two endings….
This speedrun is 100% tool assisted.
Charlie’s always known how to string words together in accurate but powerful ways.
On Reddit I have thousands of comments, over 240,000 karma, and I haven’t logged in in around two years.
But then, like with Lemmy, I picked my subreddits carefully and left when it seemed like they were being overrun with bots.
Every single time Russia has announced a ceasefire since it became a nation in the 90s, that’s been so they can move their troops into better positions unhindered. Often it has been followed by a brutal attack that cares nothing about civilian or Russian casualties.
I’m sure Ukraine knows this already.
Threats and mixed messages? Is the US involved?
So… Zoom went down because GoDaddy mistakenly started resolving the domain to 0.0.0.0? That’s what it sounds like….
In some cases, it’s people who’ve done the research and written the paper who then use an LLM to give it a final polish. Often, it’s people who are writing in a non-native language.
Doesn’t make it good or right, but adds some context.
Ukrainians have been buying John Deere tractors for years… and reprogramming them.
No reason why they couldn’t do the same with Teslas.
The money they get from the government to run it has a small portion tagged as COVID money for disaster response. Which somehow has resulted in the entire funding being tagged COVID. Which means, unlikely to be renewed tomorrow.
Interesting story.
I started using Objective C in 1994 on NeXTcubes, and later NeXTstations.
For simpler, one-off projects, it was great; also great for its ability to make any existing C library or function (or even block of asm) an object that played nicely with all the rest. And every API was just another set of objects! Discovery was easy.
It wasn’t until it came to maintenance of complex codebases that it became a problem. There’s a reason things like NSurlHandler stuck around right into modern macOS — replacing objects like THAT had implications all up and down the dependency chain. Essentially, it became Apple’s equivalent of DLL Hell.
It was also the last language that I thought could be almost all things to all people; after that, I realized that specialized languages that performed really well in a single context were a much better way to go.
Of course it might. And the percentages are all subject to variation depending on who wants to buy and sell stock at the time.
There are commercial ones — but they sell to businesses, not individuals. And whether they’re trustworthy is open to discussion.
Could be soon in the EU….
The term “Artificial Intelligence” has been bandied around for over 50 years to mean all sorts of things.
These days, all sorts of machine learning are generally classified as AI.
But I used to work with Cyc and expert systems back in the 90s, and those were considered AI back then, even though they often weren’t trying to mimic human thought.
For that matter, the use of Lisp in the 1970s to perform recursive logic was considered AI all by itself.
So while you may personally prefer a more restrictive definition, just as many were up in arms with “hacker” being co-opted to refer to people doing digital burglary, AI as the term is used by the English speaking world encompasses generative and diffusive creation models and also other less human-centric computing models that rely on machine learning principles.
At least sane heads prevail somewhere.
And that’s really the right answer. Let the US randomly punish its citizens and keep the EU as a stable place to invest that follows the predictable rules.
He’s draining the swamp with a pump and dump!
Since we’re discussing Windows privacy here…
What I’d really like is something that creates a situation like VeraCrypt plausible deniability, but where the base image gets updated regularly so that the timestamps and temporary file usage also look plausible for a computer used today.
Then instead of running an app like this, you just log out, and when you log in with the wrong password, it presents a plausible if mostly empty userland that overwrites the real encrypted data as new files are written to disk.