This server, maintained by Internet carrier Cogent Communications
Found the problem!
So the article repeats, several times, “waymo relies on remote operators”. I don’t think the author knows what “self-driving” means.
Yahoo search is just reskinned Bing, if that matters to you.
Possible? Yes. Likely? Not at all.
To perform a zero knowledge proof, you’d have to have structured data to support the claim, which most whistleblowers would not have. If a whistleblower already had the hard evidence in hand, e.g., serial numbers and timestamps, they could have just provided those anonymously, and someone could follow up. The problem is, you can’t always get a copy of the hard evidence without revealing your intent to the employer, or at least, other employees.
Presumably most whistleblowers are making unsubstantiated claims that something happened, or maybe with light evidence. Based on who they are, a journalist or investigator may then elect to follow up and dig up the hard evidence to support the claim. This requires revealing your name and position/relationship to at least one person. Rarely, they would be willing to put themselves out there to provide an affidavit under oath, which itself is not enough to pursue criminal charges (though it could help build a case around intent or willful neglect, or help support a warrant or discovery).
It’s illegal, but not unheard of, to try to force journalists to reveal their sources, but the same protections are not universally in place if you reported a finding to a company’s internal affairs, for example. But unlike attorney-client privilege, or shield law protections, the risk in signing an affidavit is, as we’ve seen in recent US trials, that records will not stay sealed, and your name will be revealed to the defense and/or public.
The Model S Plaid, MG, Rimac Niverra, etc are increasingly limited by regulations more than anything. Quite literally, they are at the limits of rolling friction for street legal tires, which is why you’re not seeing a lot of variance at the top of the market.
As far as people I’d trust to not just make shit up, I’d say Librarian, aka, professional fucking researcher is high on the list.
For encryption, the client and server need to share their private keys.
This is incorrect, for asymmetric (public-private) encryption. You never, ever share the private key, hence the name.
The private key is only used on your system for local decryption (someone sent a message encrypted with your public key) or for digital signature (you sign a document with your private key, which can be validated by anyone with your public key).
For the server, they are signing their handshake request with a certificate issued by a known certificate authority (aka, CA, a trusted third party). This prevents a man-in-the-middle attack, as long as you trust the CA.
The current gap is in inconsistent implementation of Organization Validation/Extended Validation (OV/EV), where an issuer will first validate that domains are legitimate for a registered business. This is to help prevent phishing domains, who will be operating with TLS, but on a near-name match domain (www.app1e.com or www.apple.zip instead of www.apple.com). Even this isn’t perfect, as business names are typically only unique within the country/province/state that issues the business license, or needed to be enforced by trademark, so at the end of the day, you still need to put some trust in the CA.
So if ISPs are once again Title II common carriers, how can they enforce the TikTok ban? 🤔
Probably a good change. Most legitimate bulk email messaging probably goes through a third party service already in your SPF record; surveymonkey, listserv, etc.
For your last two questions, the counterpoint is, if even Microsoft can’t stop a dedicated nation state, how can any other major service provider say they haven’t been compromised?
The standard now is, assume breach. While unfortunate, the industry average for MTTD is in months. Microsoft was at least good enough to detect it within six.
Can Broadcom or Palo Alto say the same? Amazon, Google, Apple, Cisco?
It doesn’t need to push upstream to your lemmy home instance; it could just be a local filter.
While true, it’s pretty asinine to hold companies operating in China accountable for complying with Chinese law. It sucks, but they aren’t just going to abandon the Chinese ~cash cow~ market.
Link to source article. The linked article steals the text and images verbatim.
Original Doom was not GPU accelerated.
The games in progress I mark as favorites, I have “Finished” and “Play Next” categories, and I have a big dump category called “Won’t Play”.
Aside from that, I have some big categories for collections of old games from humble bundles and steam sales, like legacy Myst, Wizardry, or Sierra games, or like Star Wars game collections.
BlackRock, for one, which shouldn’t make you feel any better.
NeXT was a mediocre BSD front end and a few interesting Objective-C libraries. Apple’s board of directors pretty much crawled back to Jobs hat in hand after the disasters of Sculley and Spindler.
Or, the real sign of gentrification is that the Google Maps car drives by your neighborhood more than once every five years. Guarantee that’s not happening in the projects.
antitrust law does not regard as illegal the mere possession of monopoly power where it is the product of superior skill, foresight, or industry
United States v. Grinnell Corp. (1966).
A market share of ninety percent "is enough to constitute a monopoly; it is doubtful whether sixty or sixty-four percent would be enough; and certainly thirty-three per cent is not.
United States v. Aluminum Co. of America (1945)
Only the cyber truck. Model S and 3 refreshes are still on the legacy platform, with a lithium ion 12V.