![](https://pawb.social/pictrs/image/304395c4-489a-4eab-9069-0e82790113ab.png)
![](https://lemmy.world/pictrs/image/ca9b0de3-205f-47ca-a620-5fbddb680695.png)
IIRC, you can run the Xiaomi unlocking software in wine: https://www.hardreset.info/devices/redmi/redmi-9c/faq/faq/xiaomi-bootloader-unlock-miui10/
IIRC, you can run the Xiaomi unlocking software in wine: https://www.hardreset.info/devices/redmi/redmi-9c/faq/faq/xiaomi-bootloader-unlock-miui10/
Good, get it all offline so the LLM Assholes can’t use it.
Lol, worst autocorrect ever. XD
If it’s the user’s responsibility to secure the operating systems they use then isn’t it both illogical and immoral for Microsoft to keep the source code secret?
It was a Saturday, but I was on-call when Networking shit the bed. One of the main trunk lines degraded and they took almost five minutes to switchover to backup 'cuz their automated degredation monitoring was on a five-minute interval. XD
That’s a good recommendation, unfortunately I’ve already played it to death. 😸
I already play the heck out of it on my steam deck and I’m looking for something else for my phone.
As long as you want, assuming that you’re fine with the security risks and everything that’s rendered incompatible in the future.
Quit ruining the joke. XD
Sounds like an advantage to me…
If you have root, then AdAway: https://f-droid.org/en/packages/org.adaway/
We’ve got that too, this is just a backup / team-specific monitoring tool in case anything falls through the cracks. Got a six-nines uptime record to maintain. XD
A work script that generates a report of SSL certificates and their expiration dates for multiple applications in prod.
An artist preparing a brush to paint with is not doing art, they’re doing engineering to make art tools.
They employ those art tools to make art, but the tools themselves are works of engineering, not art.
That isn’t to say that art tools cannot be art, such as source code that’s formatted like poetry or ASCII images, but that’s a very different sort of design work than the development of base functions.
A “side-channel attack” is one where fundamental flaws in the encryption implementation method are targeted, as opposed to flaws in the cryptographic algorithm itself.
By means of analogy, if your cryptographic method is to go to a locked room to have a private conversation, then a spy doesn’t have to pick the lock if they can still hear you through the door. The locked-room security method itself isn’t flawed, but implementing it without a soundproof door has much the same result.
In this case:
The threat resides in the chips’ data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access in the near future. By loading the contents into the CPU cache before it’s actually needed, the DMP, as the feature is abbreviated, reduces latency between the main memory and the CPU, a common bottleneck in modern computing. DMPs are a relatively new phenomenon found only in M-series chips and Intel’s 13th-generation Raptor Lake microarchitecture, although older forms of prefetchers have been common for years.
Security experts have long known that classical prefetchers open a side channel that malicious processes can probe to obtain secret key material from cryptographic operations. This vulnerability is the result of the prefetchers making predictions based on previous access patterns, which can create changes in state that attackers can exploit to leak information.
So, the encryption the chips use is solid, but some of the hardware employed can still leak data.
Removed by mod
Randomly generated content is usually a bad idea on public-facing websites. Generating and displaying it automatically means you only get to inspect the results after the fact, so you’re relying on the image generator to never produce something unacceptable.
Having a DB of prepared images means you can pick through and remove all the unacceptable ones before they have a chance to be displayed.
Sure you can, you just need a sufficiently diverse database of images at which to point your random number generator. No generation necessary, just aggregate human artistic output.
In terms of expectation, this is more in line with my fears than my hopes.
All the effort they’re putting into slowing the pace of the game is just added cost for development and it’s going to hurt them where it really matters, music licensing.
Half the appeal of the original was a soundtrack of popular music that fit the mood of the frenetic gameplay perfectly. Now they’ll have to pick lower-energy tracks to suit a meandering “open world” game that might get interrupted by other players at any moment.