without addons to control internet crazy, that word “function” is doing some heavy lifting.
…just this guy, you know.
without addons to control internet crazy, that word “function” is doing some heavy lifting.
it be there! ;-)
awesome job!
peachy keen, friend. peachy keen.
GNUs Not Unix. I don’t recall him claiming it was. if he did, well… :-/
didnt finish the video but, seriously, one of the best laymans explainations I have seen of emulation and thin compatibility layers.
plate number is tied to a VIN which describes the make/model. (sir, this is a wendys toyota. where is the honda?)
replies not required from the plate - plate has a specialized qrcode printed across the entire plate (infrared reflector?) with an identifier (lic + other public info?) and signed with an RSA keypair - reader can authenticate the information and a qrcode read counts as a verifiably good read
…or just ship RFID tags in the yearly inspection stickers - same cryptographic concept
none of this is hard or costly. only impediment is public rejection and we all know that can be managed.
very cool idea. they will counter with RFID or turn the plate into the equiv of a qrcode. store a cryptographically secure hash of the plate number and you pretty much put an end to that, no?. if I cant get a crypto signed version of your plate, flag the the car as a scofflaw (or worse) and track it as it travels in other ways. I think we are pretty much screwed without a change in laws.
with anti-women laws in some of these states, this is terrifying.
sadly, agreed. mindshare leads to adoption, tho - so putting Firefox in front of more faces is always a positive. after all, its how google dominates.
I’d wager that the cameras can’t read them either if you can’t at 10 yards
I might not take a bet on that. most license plates use reflective paint to aid in this. it would surprise me if paint and cameras are not tuned to at least one non human-visible wavelength.
polarized plate covers, specialized spray coatings, etc may work, but I am not betting my freedom on it. time to go bond style and get rotating plates.
a big thank you for your comment. comments like these really do help me to not skip worthwhile articles.
nah, lets get them switched away from chromium based spy machines.
yes, but you really don’t want to nat if you dont have to - gets too messy too quickly when direct IP connectivity is right there.
@shadowintheday2@lemmy.world parent comment is correct. check routes on device C. make there is either a default route or a specific route back to A via B.
seeing it now on fdroid.
they are. props, however, for system76 branching out into their in-house hardware.
this thread is it in a nut shell. the x11/wayland situation can trip things when it really should be super seamless. that will be fixed soon enough.
if you are ok with an Ubuntu base (which these days is drifting further from its Debian base) then regular mint is great.
if forced…
not hating on ubuntu, its just been moving away from where I am at.
just when you are sure this article is going to fluff out on you, it doesn’t.
But how does AI tell when someone is most likely lying? They’re smiling like an American.
I was oddly surprised at how I connected with this article. a useful read in a defining epoch.
You have a double standard.
well, don’t we all? but I think my argument is somewhat well founded. I have a reply in-composition, but just got project smacked. will reply as soon as I am able. didnt want you to think I had abandoned a conversation.
That’s security through obscurity. It’s not that Linux has better security, only that its already tiny desktop market share around 2003 was even smaller because of different variations.
no, its absolutely not. its choosing software components based on known security vulns or limiting exposure to a suite of suspected or established attack vectors. its absolutely not security through obscurity. these are fundamental choices made every day by engineers and sysadmins everywhere as part of the normal design, implementation and maintenance process. there is nothing “obscure” about selecting for certain attributes and against others. this is how its done.
perhaps you disagree with this.
That’s again blaming the Microsoft user for not understanding computers but not blaming the Linux user for running as root.
? its not the users job to understand OS security. to expect otherwise is unrealistic. also, virtually no “average” linux user, then or now, ran/runs as root. the “root X” issue related to related to requiring XWindows to run with and maintain root privs., not the user interacting with X running as root. it was much more common in the XP era to find XP users running as administrator than a “Linux user for running as root” because of deep, baked-in design choices made by microsoft for windows XP that were, at a fundamental level, incompatable with a secure system - microsofts poor response to their own tech debt broke everything “NT” about XP… which is exactly the point I am trying to make. I am not sure your statement has any actual relation to what I said.
Crowd sourced, open access FLOS(Data) is almost always good. will check it out. thanks!