Jump to content

ScratchCat

Member
  • Posts

    1,434
  • Joined

  • Last visited

Everything posted by ScratchCat

  1. iFart - I would pay money to watch Apple introduce this.
  2. After 30 tabs I start forgetting what I have open and just start opening new ones rather than use the old ones.
  3. AI learns from it's surroundings...so this one is going to learn to be constantly late?
  4. ScratchCat

    The $50 GAMING pc is nearing completion, all th…

    Replace the 460 with a 480. You then won't need to do any manual wood burning, it'll just catch fire.
  5. Since we are now going by locations I'd vote for Zzyzx, it's right next to the Mojave - perfect for an incremental update no one will ever spell correctly.
  6. ScratchCat

    Wasn't the whole AMD 7nm thing introduction sup…

    @OnyxArmos Tell that to the scrambling engineers who had to develop X299 to compete with Threadripper.
  7. I would place my bet on IKE, the key exchange of IPsec. There were suggestions from various leaks that the NSA could break a large proportion of VPN connections and with IPsec being used frequently in an enterprise environment it could make it the exploited target. In 2015 the Logjam attack was made public which would explain how the NSA could be decrypting VPNs on a large scale. It is based around the fact that part of the algorithm used to crack the Diffie-Hellman key exchange is based off a constant value which is the same for all implementations of the same key size so an adversary could precompute (and the NSA has a lot of money to spend on equipment) the part of the solution for this constant value and use it later to quickly crack a key exchange later. https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/ https://www.theregister.co.uk/2015/10/19/nsa_crypto_breaking_theory/ There were counter arguments to the paper but even if it wasn't feasible then remember - the NSA have had 4 more years and can store any interesting traffic it wants for later decryption. I would also argue that AES has not been broken - the NSA still recommend AES, although they did up the recommended key length for certain materials to 256-bits a while ago.
  8. That's a brave thing to say in a forum where every second pfp is a waifu... Except that action is common place in most other countries, heck with Wireguard there will be a VPN built directly into the Linux kernel on mainline. As a comparison, would you check in a foreign country if it is legal to burn an ISO?
  9. Oh no! How will we survive without yet another follow-the-hype-but-dead-in-a-year cryptocurrency?
  10. ScratchCat

    Very interesting paper on how Facebook collects…

    Am I correct to assume that the app developers used the Facebook SDK which automatically enables logging when used unless the developer explicitly disables it? This strengthens my conviction to keep all my devices connected to a VPN to pipe all requests through something like a Pi-Hole just to try and block these built in trackers.
  11. Politicians already give up a huge chunk of their privacy just like any other public figure. If you say something like a rude joke and someone overhears you will suffer minimal consequences while a politician, internet personality and/or celebrity doing the same would cause a media ****storm and ruin their career. Requiring them to give up their privacy would (apart from probably violating human rights, ruining their family life, giving trolls extra ammunition) place their career on a knife's edge just because their career *may* go far. If this had only been politicians and only contained data collected by institutions it could be assumed that this could have all come from one source, however the report indicates everything from the letters of Merkel to the holiday photos of a TV presenter (not from a state station) was released.
  12. We are sure on the upper bound for the RTG's lifespan based on the decay rate and can estimate the lower bound using information on how the thermocouples in the Voyager probes degraded. After that it's just keep shutting down the next least essential piece of equipment to fit the power constraint until the probe no longer can communicate with us.
  13. The reason they are asking for the keys is because they can't crack the encryption, otherwise why let everyone know that you are snooping around? The issue I have with this is not how ridiculously dangerous passing on these keys is but how easily it is circumvented. Bob the Gangster only needs to use PGP and this plan falls into the water, dragging the privacy of ordinary citizens with it.
  14. Use it then, can't wait for someone to reference "Amazon robot attacks workers" and that image comes up. 0 It would shuffle along slowly until someone gave it a hard shove, spilled water on it, put spray pain over it's cameras or anything similar. A robot on wheels could do serious harm - walking currently is simply hard.
  15. Is it really that hard to pull out a 10 gram piece of plastic and lightly brush it against the terminal?
  16. Do not read into this. Which run was this? 1st? 5th? 30th? The difference between a cold or hot start test can be >20%, enough to get it into the ballpark of the other phones. This is only a single benchmark. The previous Exynos was 25000 points below the SD845 in Antutu yet performed noticeably worse in real life, writing and/or burst tests due to the frequency scaling. We don't know if this is real. (Tying into the second point) Antutu isn't the real world. If benchmarks were exact representations of real world performance there would be no "X vs Y SPEED TEST" and no comment on the performance in the real world in phone reviews.
  17. Ask questions about what you are can do to pass the time
  18. Raja just taught them the art of refreshing a product over and over. They haven't noticeably changed the architecture in a number of generations now, only pushing frequencies, adding cores and fixing hardware vulnerabilities.
  19. Not only could this run Crysis, this NAS could run two instances at once. If Ford sue QNAP then the US Military (P-51 Mustang) could sue Ford and any horse breeder could sue both. It's a strange decision to go with two smaller CPUs rather than a single larger one or even just an 8th Gen with twice the cores, I feel like balancing utilization of memory and storage will be tricky.
  20. Still better than Battlefield: 1942 2 2142 1943 BC2 3 4 1 V (apparently conventional notation isn't cool in 2018)
  21. ScratchCat

    "The US is in danger!" -Lockheed Martin ?

    0:15 - Cue dramatic zoom
  22. If all they did was bump up clock speed they would have had to also bump up the voltage which in turn would have increased the power consumption at a greater than linear rate. Instead AMD kept the voltage approximately the same but used the node change to bump up the clocks with only a (close to) linear increase in power. If the node scales downwards as well as up AMD might be able to offer some more competitive mobile cards (however not enough to compete with Pascal let alone Turing).
×