Skip to content

YouTube rolls out more unskippable ads that make viewers wait even longer to watch videos - Dexerto

Technology
231 166 6.5k
  • 467 Stimmen
    68 Beiträge
    1k Aufrufe
    O
    It wasn't a direct reference, but definitely inspired by Dr. cox.
  • 33 Stimmen
    13 Beiträge
    89 Aufrufe
    I
    This has actually been done for quite a long time. Roman historians could look up common words in databases from partial words and get a pretty good guess at the overall inscription from context.
  • Say Hello to the World's Largest Hard Drive, a Massive 36TB Seagate

    Technology technology
    263
    1
    615 Stimmen
    263 Beiträge
    4k Aufrufe
    M
    Really sad that S3 prices are still that high... also hetzner storage boxes
  • One Law to Rule Them All: The Iron Law of Software Performance

    Technology technology
    1
    1
    32 Stimmen
    1 Beiträge
    23 Aufrufe
    Niemand hat geantwortet
  • 26 Stimmen
    11 Beiträge
    99 Aufrufe
    F
    Absolute horseshit. Bulbs don't have microphones. If they did, any junior security hacker could sniff out the traffic and post about it for cred. The article quickly pivots to TP-Link and other devices exposing certificates. That has nothing to do with surveillance and everything to do with incompetent programming. Then it swings over to Matter and makes a bunch of incorrect assertion I don't even care to correct. Also, all the links are to articles on the same site, every single one of which is easily refutable crap. Yes, there are privacy tradeoffs with connected devices, but this article is nothing but hot clickbait garbage.
  • 349 Stimmen
    72 Beiträge
    921 Aufrufe
    M
    Sure, the internet is more practical, and the odds of being caught in the time required to execute a decent strike plan, even one as vague as: "we're going to Amerika and we're going to hit 50 high profile targets on July 4th, one in every state" (Dear NSA analyst, this is entirely hypothetical) so your agents spread to the field and start assessing from the ground the highest impact targets attainable with their resources, extensive back and forth from the field to central command daily for 90 days of prep, but it's being carried out on 270 different active social media channels as innocuous looking photo exchanges with 540 pre-arranged algorithms hiding the messages in the noise of the image bits. Chances of security agencies picking this up from the communication itself? About 100x less than them noticing 50 teams of activists deployed to 50 states at roughly the same time, even if they never communicate anything. HF (more often called shortwave) is well suited for the numbers game. A deep cover agent lying in wait, potentially for years. Only "tell" is their odd habit of listening to the radio most nights. All they're waiting for is a binary message: if you hear the sequence 3 17 22 you are to make contact for further instructions. That message may come at any time, or may not come for a decade. These days, you would make your contact for further instructions via internet, and sure, it would be more practical to hide the "make contact" signal in the internet too, but shortwave is a longstanding tech with known operating parameters.
  • 153 Stimmen
    4 Beiträge
    52 Aufrufe
    J
    Agreed - the end of the article does state compiling untrusted repos is effectively the same as running an untrusted executable, and you should treat it with the same caution (especially if its malware or gaming cheat adjacent)
  • 551 Stimmen
    30 Beiträge
    365 Aufrufe
    swelter_spark@reddthat.comS
    Yeah, I don't prefer that. But with some things I feel like it's barely a downside, and I'd put Boxes into that category. It's useful and well-designed enough in terms of functionality that I'm willing to overlook the Gnominess.