I’ll assume that Loongson are equally as backdoored, but by Chinese intelligence rather than US intelligence.
RISC-V and OpenPOWER are the last remaining non-user-hostile ISAs. That and possibly old x86.
I’ll assume that Loongson are equally as backdoored, but by Chinese intelligence rather than US intelligence.
RISC-V and OpenPOWER are the last remaining non-user-hostile ISAs. That and possibly old x86.
Social inertia and an extra helping of users hate having to learn things.
The CSAC also accused Intel of embedding a backdoor “in almost all” of its CPUs since 2008
Hmmm They couldn’t be referring to the extensively researched, reverse-engineered, and years-documented Intel Management Engine, could they?
CSAC is only just now coming across this information? Better late than never, I guess.
Edit: Having now finished the article, yes they are.
YaCy self-hostable search engine kind of has this feature and architecture by way of a DHT inter-peer search, in combination with local page caching. Although the caching feature is something that a node operator needs to manually enable.
Aside: I am surprised to see people (on the fediverse of all things) hating on cryptocurrency. Where did this sudden turn of perception come from?
Zero sympathy for the phone zombies that saw a random code and decided to pursue it uncritically. Streamwise are pretty awesome trolls apparently.
Minetest
You’ve been very busy talking to several of my puppet accounts.
It does make sense from the perspective of “destroy the public’s perception of ‘unsafe’ USB storage so that we can push them to use our ‘safe’ cloud storage (on our terms) instead”.
…with usbguard installed and configured with a default-deny policy.
It’s a bit more nuanced even.
If you have one-time physical access, then you have total access, permitting the storage is not encrypted.
If you have recurring, undetected physical access, then you have total access.
Ex: Dropping a script into someone’s unencrypted /boot partition that captures the decryption credential, then coming back later to collect the credential and maybe also remove the evidence.
You were on the right track with the HTPC. It just needs an appropriate input device. I recommend:
The best “TV remote” in the world.
Gamers have a very short memory. The “ooh shiny!” mentality means that, as a demographic, they are willing to tolerate a high degree of abuse as long as they get to placate themselves with self amusement software.
Disallow corporate entities from owning residential property.
And tax the shit out of second (and third and beyond) home owners. If you don’t reside there it is absolutely a luxury. Nobody on the face of this Earth needs more than one dwelling.
Not a bother at all! I have used uMatrix for several years now. It is no longer actively maintained, but has an absolutely unrivaled grid interface (hence Matrix) that comprehensively lays everything out into columns and rows.
Rows represent the different domains and subdomains that a webpage loads assets from.
Columns represent the different types of assets individually.
Sane, strict rules that can be set within the My rules page:
https-strict: * true
https-strict: behind-the-scene false
noscript-spoof: * true
referrer-spoof: * true
referrer-spoof: behind-the-scene false
no-workers: * true
* * * block
* 1st-party image allow
Or these can be set with the graphical matrix grid with global scope selected, then click on the lock icon to make it persistent.
What uMatrix does that uBlock Origin does not (or the authors refuse to integrate into uBlock Origin):
Unfortunately, uMatrix has been left to bitrot, so I’ve been closely watching the development of xiMatrix which replicates the idea and extends it to also handle remote fonts and inline scripts. (But still needs further development before I can consider it a drop-in replacement IMO).
It can and does continue to grow. We do not delete content. There is a trove of old (not recently acquired) files on these drives that several members have not gotten around to yet.
I am currently trying to devise a system wherein these different drives can be synced across geographically distant locations. Like a bi-directional rsync system which doesn’t remove extraneous files from the destination.
I don’t have favorites. Just ones that suck the least.
It loads fine for me without CSS or javascript.
Why would you ever want to allow the execution of
adobeDatalayer_bridge.js
adobe_analytics_bridge.js
globalstore_bridge.js
?
Good example of third party trash hiding behind first party domain.
Capital punishment disproportionately affects males. Capital punishment is sexist.
Hey look, an article documenting 2020!