

My wife borrows a lot of ebooks from our library, which are delivered to a kindle through Amazon. I’ve used this USB download option to remove the DRM from some of those borrowed books. Guess I’ll have to figure out a new approach now…
My wife borrows a lot of ebooks from our library, which are delivered to a kindle through Amazon. I’ve used this USB download option to remove the DRM from some of those borrowed books. Guess I’ll have to figure out a new approach now…
Time for the US military to replace all their humvees?
Jesus didn’t have guns.
My employer is switching from Microsoft to Google for office tools next month and they’ve been championing its availability to all of us. I’m not looking forward to it…
In this day and age you need to be very careful abandoning anything in the cloud. My employer regularly contracts with HackerOne to test the security of our websites. On at least one occasion they demonstrated an exploit by creating an AWS S3 bucket with the same name as a bucket we stopped using years ago. We still had an old DNS record pointing to that old bucket if I recall correctly…
Well not immediately… Years from now when the military develops something even better then this will all become surplus and sold off to SWAT teams etc. for next to nothing.
At least it’s not 100 trillion James Bonds.
I think you have it backwards. All Trump cares about us money, and compared to Musk, Trump is a pauper.
Fun fact: the US Coast Guard used to have a base in the Oklahoma panhandle. It’s sole purpose was a LORAN transmitter.
OnStar freaked me out after an accident in a rental car a few years ago. We had no idea the rental car had it. We got rear ended by a drunk driver and spun 360 degrees off the road. Within a second or two of coming to a stop a voice was asking if we were ok.
So the copyright industry will push again for back doors that they are given the keys to.
Simple. After they gain access to the routers and realize everything is encrypted then they’ll start throwing piles of money at politicians to outlaw encryption.
Exactly. I know folks that live on the 3rd floor of an old walk-up. Stairs are the only way in & out. So if you want to replace delivery people then it would need to be a robot that can navigate narrow & windy stairs.
That applies to public spaces, yes, but not ALL spaces. I’m on the board of directors for a small non-profit organization that expanded their facility a few years ago. We had to prove for ADA compliance that one floor of our facility was restricted in its use and not for public access. If we had been required to make it publicly accessible then it would have required an elevator, which would have been so expensive that it would have put an end to that expansion project before it even started. The public spaces are all fully ADA compliant. Those private spaces are not.
Also, like most building code requirements etc. the ADA only comes into effect with new construction or when the renovations to an existing property exceed a certain threshold (I forget the specifics). There are plenty of older buildings out there that aren’t fully ADA compliant.
I know people who live on 3rd floor walkups that were likely built 100+ years ago with narrow curved stairs as the only way in or out. If you want to replace a delivery person with a robot in places like that then wheels won’t cut it.
But I want my own personal luxury car that I paid $100,000 for to go out on its own in the middle of the night while I’m asleep and have it earn money for me as a self-driving Uber…
Because the entire world is designed around the human body and the way it moves. It’s theoretically much easier to introduce a humanoid robot into an existing workspace than it is to retrofit all the doors, stairs, etc. to allow a wheeled robot to move around.
Spoofing is a whole hell of a lot easier said than done. Content delivery networks like Akamai, Cloudflare, etc. all know exactly how different versions of different browsers present themselves, and will catch the tiniest mistake.
When a browser requests a web page it sends a series of headers, which identify both itself and the request it’s making. But virtually every browser sends a slightly different set of headers, and in different orders. So Akamai, for example can tell that you are using Chrome solely by what headers are in the request and the order they are in, even if you spoof your User-Agent string to look like Firefox.
So to successfully spoof a connection you need to decide how you want to present yourself (do I really want them to think I’m using Opera when I’m using Firefox, or do I just want to randomize things to keep them guessing). In the first case you need to be very careful to ensure your browser sends requests that exactly matches how Opera sends them. One header, or even one character out of place can be enough for these companies to recognize you’re spoofing your connection.
AKA greed. Why license your content to Netflix when you can have your own streaming service and lock your viewers into your piddly little hoard of content?
Just how many streaming providers are there today? That number likely changes almost daily at this point…
Any army that treats their troops as “cannon fodder” deserves not only all the casualties they rack up, but the long term social, political, and economic hardship that is pretty much a guaranteed result of such a policy.
The constant rounding up & minimal training of “cannon fodder” is expensive both in the short and long term. Better to protect well trained resources and have them continue to gain experience by using more advanced weaponry that minimizes risk to them.
I’d be surprised if that worked these days. They do much more than just a cursory check whenever we go. And they also now scan your membership when you enter, and your photo pops up on their tablets. I’d be curious what would happen if the photo didn’t match…