Jump to content

WillyW

Member
  • Posts

    50
  • Joined

  • Last visited

Reputation Activity

  1. Informative
    WillyW got a reaction from thechinchinsong in Security researchers detail a 4 year ongoing exploit of iPhone and all Apple Devices   
    Summary
    Kaspersky Labs detailed an attack chain that affected Apple devices mostly iPhones that was on-going for four years before it was shut down by patches, but jailbroken iOS devices remain vulnerable. The alleged originator of this is the NSA as per the Russian Gov't without supporting evidence. One of the vulnerabilities, CVE-2023-41990, was a vulnerability in Apple’s implementation of the TrueType font which had existed since the 90s. The detail of how the attack chain achieves infection is presented in the video and is quite complicated and sophisticated, but in brief it takes advantage of several previously undocumented features/vulnerabilities and attempts to hide itself from detection by sophisticated means and is quite long and complicated. Once infected the malware extracts users data including pictures but in order to reduce bandwidth it makes use of the Apple Silicon's own machine learning features to perform image recognition on photos. The initial attack vector is undetectable by the user, and requires only the phone number of the victim.
     
    Quotes
     
    My thoughts
    This is a report from Kaspersky which is a Russian security research agency with alleged Russia gov't connections, but regardless well documented. With all the advertising from Apple about how secure and privacy focused their devices are you have to wonder if they know they have a culture problem. The four vulnerabilities have previously been reported and patched (CVE-2023-32434, CVE-2023-32435, CVE-2023-38606, CVE-2023-41990) but what is new here is a detailed account of what they did and who they were targeting. The article mentions "Besides affecting iPhones, these critical zero-days and the secret hardware function resided in Macs, iPods, iPads, Apple TVs, and Apple Watches." What this brings home is a number of things, first when you are in a closed ecosystem you make yourself more vulnerable to hacks that work on all devices, and that you really should not be using devices that are no longer supported. It is likely that if this was the NSA they have other ways in, and have already moved on, but now that the vulnerabilities and the attack method is detailed that it becomes that much more easy for others to exploit these vulnerabilities. Also, the fact that users do not notice hacks occurring does not mean that they are secure from them or that they haven't already been compromised, as mentioned in the Q&A portion of the video below there is no way for the user to know they are or have been infected without taking deliberate steps to determine i.e. check logs or take backup an analyze with a tool. At my work we train users monthly on threats and despite all this we still have users clicking on things they shouldn't and despite our training we still have people trying to hide when they have.
     
    Sources
    https://arstechnica.com/security/2023/12/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature/
     
  2. Agree
    WillyW reacted to Sauron in Security researchers detail a 4 year ongoing exploit of iPhone and all Apple Devices   
    The russian government isn't really a solid source for anything and, if anything, the russian government claiming something is often indicative of the opposite being true.
     
    With that said, kaspersky is not the russian government, even though they may have ties to it, and as far as I know they have a fairly solid reputation in the field.
     
    And this shows when you look at which claims come from where:
    It was the FSB that claimed the NSA was involved, likely with absolutely no evidence. Kaspersky has not made these claims. @WillyW I would suggest updating your post to reflect that NSA involvement is not "likely" but merely "alleged with no evidence by adversary agencies".
     
    -
     
    Looking at the article the thing that pops out to me is the initial attack vector:
    the truetype vulnerability is whatever (although I suppose that's what you get for adding your own proprietary and undocumented instructions to a common format), but the fact that imessage processes attachments automatically seems absolutely insane to me. It's pretty much begging for a no click exploit like this.
  3. Informative
    WillyW got a reaction from jagdtigger in Security researchers detail a 4 year ongoing exploit of iPhone and all Apple Devices   
    Summary
    Kaspersky Labs detailed an attack chain that affected Apple devices mostly iPhones that was on-going for four years before it was shut down by patches, but jailbroken iOS devices remain vulnerable. The alleged originator of this is the NSA as per the Russian Gov't without supporting evidence. One of the vulnerabilities, CVE-2023-41990, was a vulnerability in Apple’s implementation of the TrueType font which had existed since the 90s. The detail of how the attack chain achieves infection is presented in the video and is quite complicated and sophisticated, but in brief it takes advantage of several previously undocumented features/vulnerabilities and attempts to hide itself from detection by sophisticated means and is quite long and complicated. Once infected the malware extracts users data including pictures but in order to reduce bandwidth it makes use of the Apple Silicon's own machine learning features to perform image recognition on photos. The initial attack vector is undetectable by the user, and requires only the phone number of the victim.
     
    Quotes
     
    My thoughts
    This is a report from Kaspersky which is a Russian security research agency with alleged Russia gov't connections, but regardless well documented. With all the advertising from Apple about how secure and privacy focused their devices are you have to wonder if they know they have a culture problem. The four vulnerabilities have previously been reported and patched (CVE-2023-32434, CVE-2023-32435, CVE-2023-38606, CVE-2023-41990) but what is new here is a detailed account of what they did and who they were targeting. The article mentions "Besides affecting iPhones, these critical zero-days and the secret hardware function resided in Macs, iPods, iPads, Apple TVs, and Apple Watches." What this brings home is a number of things, first when you are in a closed ecosystem you make yourself more vulnerable to hacks that work on all devices, and that you really should not be using devices that are no longer supported. It is likely that if this was the NSA they have other ways in, and have already moved on, but now that the vulnerabilities and the attack method is detailed that it becomes that much more easy for others to exploit these vulnerabilities. Also, the fact that users do not notice hacks occurring does not mean that they are secure from them or that they haven't already been compromised, as mentioned in the Q&A portion of the video below there is no way for the user to know they are or have been infected without taking deliberate steps to determine i.e. check logs or take backup an analyze with a tool. At my work we train users monthly on threats and despite all this we still have users clicking on things they shouldn't and despite our training we still have people trying to hide when they have.
     
    Sources
    https://arstechnica.com/security/2023/12/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature/
     
  4. Informative
    WillyW got a reaction from soldier_ph in Security researchers detail a 4 year ongoing exploit of iPhone and all Apple Devices   
    Summary
    Kaspersky Labs detailed an attack chain that affected Apple devices mostly iPhones that was on-going for four years before it was shut down by patches, but jailbroken iOS devices remain vulnerable. The alleged originator of this is the NSA as per the Russian Gov't without supporting evidence. One of the vulnerabilities, CVE-2023-41990, was a vulnerability in Apple’s implementation of the TrueType font which had existed since the 90s. The detail of how the attack chain achieves infection is presented in the video and is quite complicated and sophisticated, but in brief it takes advantage of several previously undocumented features/vulnerabilities and attempts to hide itself from detection by sophisticated means and is quite long and complicated. Once infected the malware extracts users data including pictures but in order to reduce bandwidth it makes use of the Apple Silicon's own machine learning features to perform image recognition on photos. The initial attack vector is undetectable by the user, and requires only the phone number of the victim.
     
    Quotes
     
    My thoughts
    This is a report from Kaspersky which is a Russian security research agency with alleged Russia gov't connections, but regardless well documented. With all the advertising from Apple about how secure and privacy focused their devices are you have to wonder if they know they have a culture problem. The four vulnerabilities have previously been reported and patched (CVE-2023-32434, CVE-2023-32435, CVE-2023-38606, CVE-2023-41990) but what is new here is a detailed account of what they did and who they were targeting. The article mentions "Besides affecting iPhones, these critical zero-days and the secret hardware function resided in Macs, iPods, iPads, Apple TVs, and Apple Watches." What this brings home is a number of things, first when you are in a closed ecosystem you make yourself more vulnerable to hacks that work on all devices, and that you really should not be using devices that are no longer supported. It is likely that if this was the NSA they have other ways in, and have already moved on, but now that the vulnerabilities and the attack method is detailed that it becomes that much more easy for others to exploit these vulnerabilities. Also, the fact that users do not notice hacks occurring does not mean that they are secure from them or that they haven't already been compromised, as mentioned in the Q&A portion of the video below there is no way for the user to know they are or have been infected without taking deliberate steps to determine i.e. check logs or take backup an analyze with a tool. At my work we train users monthly on threats and despite all this we still have users clicking on things they shouldn't and despite our training we still have people trying to hide when they have.
     
    Sources
    https://arstechnica.com/security/2023/12/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature/
     
  5. Like
    WillyW got a reaction from Needfuldoer in Beatles song is created thanks to AI   
    Summary
    With technology from Peter Jackson (Lord of the Rings producer), the remaining Beatles members were able to upscale a previously recorded set of tracks for a song and produce the song with direct input from the two deceased members of the band. The sources were a badly recorded cassette tape 40+ years ago from John Lennon, and a 90s guitar recording from Harrison, both preserved and enhanced and combined as tracks in the new song.
     
    Quotes
     
    My thoughts
    This would seem to be one of the cases where AI has benefits that most people would not have thought to think of. There are many upsides and downsides to this. Say you have a media library with very poor MP3 encoded bitrate files, sometime in the future you could use a tech like this to upscale the set. Now all you would need is some AI to write a CMS for you if wanted to be able to host this on a home NAS or offline storage. Downsides could be that in future estate holders could try to claim extended copyright on works and try to get the 50 year copyright term extended in law reducing the ability for things to go open source and a be used to create more unique works, and enrich a few people who do not contribute much to society.
     
    Sources
    https://www.theverge.com/2023/11/2/23943290/now-and-then-the-beatles-new-song-ai - Article
     
  6. Informative
    WillyW got a reaction from DededeKirby in Secret shop of Tech repair stores reveals violations in users privacy.   
    Summary
    In a survey done by CBC and researchers at the University of Guelph Ontario found that about 50% of tech repair shops snooped private data on a users computer when it was brought into repair. This included Geek Squad/Best Buy, Canada Computers and other independent repair shops.
     
    Quotes
     
    My thoughts
    This is not surprising, but it bears repeating because, at least in my experience, when your average person is faced with something that may be difficult to do or too much trouble will shrug it off and not want or not care to do it. When I send in laptops to the repair center we always remove passwords, user accounts, login info for any services, and remove the device from the domain and remove BIOS/default administrator passwords. Though I don't have time right now, I may in future consider a full automated MECM re-image.
     
    Sources
    LInk to article - CBC 20OCT23
    Link to more CBC links and videos on the topic
     
  7. Informative
    WillyW got a reaction from thechinchinsong in Secret shop of Tech repair stores reveals violations in users privacy.   
    Summary
    In a survey done by CBC and researchers at the University of Guelph Ontario found that about 50% of tech repair shops snooped private data on a users computer when it was brought into repair. This included Geek Squad/Best Buy, Canada Computers and other independent repair shops.
     
    Quotes
     
    My thoughts
    This is not surprising, but it bears repeating because, at least in my experience, when your average person is faced with something that may be difficult to do or too much trouble will shrug it off and not want or not care to do it. When I send in laptops to the repair center we always remove passwords, user accounts, login info for any services, and remove the device from the domain and remove BIOS/default administrator passwords. Though I don't have time right now, I may in future consider a full automated MECM re-image.
     
    Sources
    LInk to article - CBC 20OCT23
    Link to more CBC links and videos on the topic
     
  8. Informative
    WillyW got a reaction from soldier_ph in Secret shop of Tech repair stores reveals violations in users privacy.   
    Summary
    In a survey done by CBC and researchers at the University of Guelph Ontario found that about 50% of tech repair shops snooped private data on a users computer when it was brought into repair. This included Geek Squad/Best Buy, Canada Computers and other independent repair shops.
     
    Quotes
     
    My thoughts
    This is not surprising, but it bears repeating because, at least in my experience, when your average person is faced with something that may be difficult to do or too much trouble will shrug it off and not want or not care to do it. When I send in laptops to the repair center we always remove passwords, user accounts, login info for any services, and remove the device from the domain and remove BIOS/default administrator passwords. Though I don't have time right now, I may in future consider a full automated MECM re-image.
     
    Sources
    LInk to article - CBC 20OCT23
    Link to more CBC links and videos on the topic
     
  9. Funny
    WillyW got a reaction from CommanderAlex in Facebook Investors are Suing Facebook over data handling lying to FTC SEC and Cambridge Analytical Scandal   
    Summary
    Investors from a consortium of Facebook shareholders are suing the company over its unlawful gain in market power in a large lawsuit that was filed in Delaware. Some of the allegations are that FB had failed its 2012 consent decree, removed apps from its platform that didn't give it data, knew about the Cambridge Analytical Scandal but did nothing, paid the FTC $4.9B to protect the Zuck personally, insider trading occurred, among others.
     
    Quotes
     
    My thoughts
    If everything alleged to happen is true it would seem that everyone is now after Facebook and it is only a matter of time before heavy regulation is brought in and Zuck is ousted like Elon was at Tesla.
     
    Sources
    https://twitter.com/jason_kint/status/1440304941428473857
    https://rfob.medium.com/exclusive-facebook-executives-sued-over-cambridge-analytica-scandal-254b1cbf6b3f
     
  10. Informative
    WillyW got a reaction from soldier_ph in In an NYT investigative report Apple has essentially given up the keys to its kingdom in China.   
    Summary
    Because the majority of the Apple supply chain originates from China, Apple has given into increasingly larger demands to the Chinese gov't. They include holding all the data in China, building a system to skirt American laws for data, building a datacentre in China that is managed by a third party, giving up control of the Chinese data to said third party, allowing Chinese gov't access to the data, removing the Made by Apple in California branding on the back of its phones, setting up a system to block specific apps based on Chinese gov't requests (in the 10 thousands), which includes any apps that are critical of the Communist gov't in China, and building a separate bureaucracy to monitor apps inside of Apple which in the past has fired employees when the Chinese gov't complains, weakening security keys for data storage, and handing over the encryption keys to Chinese data to Chinese authorities. This is in stark contrast to the behavior of Apple in the rest of the world. China accounts for 1/5th of all sales in Apple.
     
    Quotes
    My thoughts
    While it is not much of a surprise that this is happening, this hasn't been as well documented specifically for Apple in any other story. Without getting into political topics the amount of customization that is going on here is staggering. Given the volume of interference in other countries political and electoral affairs and state sponsored hacking that China does ongoing (like other big powers) it is a little surprising that Apple has given in the way that it has and shows how dependent on China Apple and other tech players have become. This is a little reminiscent of the whole Coca-cola / fanta thing that occurred during the second world war because of the bad optics of doing business in Germany during that time.
     
    Sources
    https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html
  11. Informative
    WillyW got a reaction from thechinchinsong in In an NYT investigative report Apple has essentially given up the keys to its kingdom in China.   
    Summary
    Because the majority of the Apple supply chain originates from China, Apple has given into increasingly larger demands to the Chinese gov't. They include holding all the data in China, building a system to skirt American laws for data, building a datacentre in China that is managed by a third party, giving up control of the Chinese data to said third party, allowing Chinese gov't access to the data, removing the Made by Apple in California branding on the back of its phones, setting up a system to block specific apps based on Chinese gov't requests (in the 10 thousands), which includes any apps that are critical of the Communist gov't in China, and building a separate bureaucracy to monitor apps inside of Apple which in the past has fired employees when the Chinese gov't complains, weakening security keys for data storage, and handing over the encryption keys to Chinese data to Chinese authorities. This is in stark contrast to the behavior of Apple in the rest of the world. China accounts for 1/5th of all sales in Apple.
     
    Quotes
    My thoughts
    While it is not much of a surprise that this is happening, this hasn't been as well documented specifically for Apple in any other story. Without getting into political topics the amount of customization that is going on here is staggering. Given the volume of interference in other countries political and electoral affairs and state sponsored hacking that China does ongoing (like other big powers) it is a little surprising that Apple has given in the way that it has and shows how dependent on China Apple and other tech players have become. This is a little reminiscent of the whole Coca-cola / fanta thing that occurred during the second world war because of the bad optics of doing business in Germany during that time.
     
    Sources
    https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html
  12. Informative
    WillyW got a reaction from whm1974 in In an NYT investigative report Apple has essentially given up the keys to its kingdom in China.   
    Summary
    Because the majority of the Apple supply chain originates from China, Apple has given into increasingly larger demands to the Chinese gov't. They include holding all the data in China, building a system to skirt American laws for data, building a datacentre in China that is managed by a third party, giving up control of the Chinese data to said third party, allowing Chinese gov't access to the data, removing the Made by Apple in California branding on the back of its phones, setting up a system to block specific apps based on Chinese gov't requests (in the 10 thousands), which includes any apps that are critical of the Communist gov't in China, and building a separate bureaucracy to monitor apps inside of Apple which in the past has fired employees when the Chinese gov't complains, weakening security keys for data storage, and handing over the encryption keys to Chinese data to Chinese authorities. This is in stark contrast to the behavior of Apple in the rest of the world. China accounts for 1/5th of all sales in Apple.
     
    Quotes
    My thoughts
    While it is not much of a surprise that this is happening, this hasn't been as well documented specifically for Apple in any other story. Without getting into political topics the amount of customization that is going on here is staggering. Given the volume of interference in other countries political and electoral affairs and state sponsored hacking that China does ongoing (like other big powers) it is a little surprising that Apple has given in the way that it has and shows how dependent on China Apple and other tech players have become. This is a little reminiscent of the whole Coca-cola / fanta thing that occurred during the second world war because of the bad optics of doing business in Germany during that time.
     
    Sources
    https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html
  13. Informative
    WillyW got a reaction from da na in In an NYT investigative report Apple has essentially given up the keys to its kingdom in China.   
    Summary
    Because the majority of the Apple supply chain originates from China, Apple has given into increasingly larger demands to the Chinese gov't. They include holding all the data in China, building a system to skirt American laws for data, building a datacentre in China that is managed by a third party, giving up control of the Chinese data to said third party, allowing Chinese gov't access to the data, removing the Made by Apple in California branding on the back of its phones, setting up a system to block specific apps based on Chinese gov't requests (in the 10 thousands), which includes any apps that are critical of the Communist gov't in China, and building a separate bureaucracy to monitor apps inside of Apple which in the past has fired employees when the Chinese gov't complains, weakening security keys for data storage, and handing over the encryption keys to Chinese data to Chinese authorities. This is in stark contrast to the behavior of Apple in the rest of the world. China accounts for 1/5th of all sales in Apple.
     
    Quotes
    My thoughts
    While it is not much of a surprise that this is happening, this hasn't been as well documented specifically for Apple in any other story. Without getting into political topics the amount of customization that is going on here is staggering. Given the volume of interference in other countries political and electoral affairs and state sponsored hacking that China does ongoing (like other big powers) it is a little surprising that Apple has given in the way that it has and shows how dependent on China Apple and other tech players have become. This is a little reminiscent of the whole Coca-cola / fanta thing that occurred during the second world war because of the bad optics of doing business in Germany during that time.
     
    Sources
    https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html
  14. Informative
    WillyW got a reaction from whm1974 in Scientists are testing Diamonds for use with Quantum Computers as they apparently can be stretched to possibly enable room temperature Quantum CPUs   
    Summary
    Scientists have been working with diamonds to test to see if they can be stretched and state that the heat and electrical conductivity would make them an ideal fit for Quantum QBits and or photons.
     
    Quotes
     
    My thoughts
    The article leaves out several important details and items. For starters you will notice that the picture shows a scale of 500nm with the strands about half that matching it to about Pentium II level transistor size, they do state in the article that it was about 100nm which would put it somewhere in the Pentium III to Pentium M size. That begs the question as to how exactly they got the diamonds to that size, acid, high energy? Also, previously it was shown that diamonds were not exactly electrically as conductive as silicon as silicon is doped with either more or less electron atoms (N , and P type doping). This might just be purely for research purposes but given the current climate it would make sense for researchers to keep these details close to their chest as knowledge of a new way to manufacture chips would be quite valuable. I have many questions, forgot a few of them.
     
    Another thought, I'm assuming that they like the stretching component of the material because naturally under different heating conditions different parts of the chip will get hotter and others will be cooler. This was shown to be something that needs to be engineered for with the whole Nvidia 'bumpgate' controversy in 2009-2010 which ended up causing Apple and Nvidia to break up because Nvidia designed a sloppy GPU chip that would break the solder balls underneath the GPU with normal use.
     
    Sources
    Inverse Article - Sarah Wells 31DEC20
     
    Reference:
    Nvidia Bumpgate
  15. Informative
    WillyW got a reaction from Doobeedoo in Scientists are testing Diamonds for use with Quantum Computers as they apparently can be stretched to possibly enable room temperature Quantum CPUs   
    Summary
    Scientists have been working with diamonds to test to see if they can be stretched and state that the heat and electrical conductivity would make them an ideal fit for Quantum QBits and or photons.
     
    Quotes
     
    My thoughts
    The article leaves out several important details and items. For starters you will notice that the picture shows a scale of 500nm with the strands about half that matching it to about Pentium II level transistor size, they do state in the article that it was about 100nm which would put it somewhere in the Pentium III to Pentium M size. That begs the question as to how exactly they got the diamonds to that size, acid, high energy? Also, previously it was shown that diamonds were not exactly electrically as conductive as silicon as silicon is doped with either more or less electron atoms (N , and P type doping). This might just be purely for research purposes but given the current climate it would make sense for researchers to keep these details close to their chest as knowledge of a new way to manufacture chips would be quite valuable. I have many questions, forgot a few of them.
     
    Another thought, I'm assuming that they like the stretching component of the material because naturally under different heating conditions different parts of the chip will get hotter and others will be cooler. This was shown to be something that needs to be engineered for with the whole Nvidia 'bumpgate' controversy in 2009-2010 which ended up causing Apple and Nvidia to break up because Nvidia designed a sloppy GPU chip that would break the solder balls underneath the GPU with normal use.
     
    Sources
    Inverse Article - Sarah Wells 31DEC20
     
    Reference:
    Nvidia Bumpgate
  16. Informative
    WillyW got a reaction from Letgomyleghoe. in Scientists are testing Diamonds for use with Quantum Computers as they apparently can be stretched to possibly enable room temperature Quantum CPUs   
    Summary
    Scientists have been working with diamonds to test to see if they can be stretched and state that the heat and electrical conductivity would make them an ideal fit for Quantum QBits and or photons.
     
    Quotes
     
    My thoughts
    The article leaves out several important details and items. For starters you will notice that the picture shows a scale of 500nm with the strands about half that matching it to about Pentium II level transistor size, they do state in the article that it was about 100nm which would put it somewhere in the Pentium III to Pentium M size. That begs the question as to how exactly they got the diamonds to that size, acid, high energy? Also, previously it was shown that diamonds were not exactly electrically as conductive as silicon as silicon is doped with either more or less electron atoms (N , and P type doping). This might just be purely for research purposes but given the current climate it would make sense for researchers to keep these details close to their chest as knowledge of a new way to manufacture chips would be quite valuable. I have many questions, forgot a few of them.
     
    Another thought, I'm assuming that they like the stretching component of the material because naturally under different heating conditions different parts of the chip will get hotter and others will be cooler. This was shown to be something that needs to be engineered for with the whole Nvidia 'bumpgate' controversy in 2009-2010 which ended up causing Apple and Nvidia to break up because Nvidia designed a sloppy GPU chip that would break the solder balls underneath the GPU with normal use.
     
    Sources
    Inverse Article - Sarah Wells 31DEC20
     
    Reference:
    Nvidia Bumpgate
  17. Like
    WillyW got a reaction from FakeNSA in Scientists are testing Diamonds for use with Quantum Computers as they apparently can be stretched to possibly enable room temperature Quantum CPUs   
    Summary
    Scientists have been working with diamonds to test to see if they can be stretched and state that the heat and electrical conductivity would make them an ideal fit for Quantum QBits and or photons.
     
    Quotes
     
    My thoughts
    The article leaves out several important details and items. For starters you will notice that the picture shows a scale of 500nm with the strands about half that matching it to about Pentium II level transistor size, they do state in the article that it was about 100nm which would put it somewhere in the Pentium III to Pentium M size. That begs the question as to how exactly they got the diamonds to that size, acid, high energy? Also, previously it was shown that diamonds were not exactly electrically as conductive as silicon as silicon is doped with either more or less electron atoms (N , and P type doping). This might just be purely for research purposes but given the current climate it would make sense for researchers to keep these details close to their chest as knowledge of a new way to manufacture chips would be quite valuable. I have many questions, forgot a few of them.
     
    Another thought, I'm assuming that they like the stretching component of the material because naturally under different heating conditions different parts of the chip will get hotter and others will be cooler. This was shown to be something that needs to be engineered for with the whole Nvidia 'bumpgate' controversy in 2009-2010 which ended up causing Apple and Nvidia to break up because Nvidia designed a sloppy GPU chip that would break the solder balls underneath the GPU with normal use.
     
    Sources
    Inverse Article - Sarah Wells 31DEC20
     
    Reference:
    Nvidia Bumpgate
  18. Informative
    WillyW got a reaction from thechinchinsong in Microsoft settles a Canadian Class Action lawsuit for Dell computers purchased from 1998 onward   
    Summary
    Microsoft has settled a class action lawsuit with a total payout of $517M, with $400M going to consumers. To date 100K people have filed claims.
     
    Consumers who purchased:
    - Microsoft OS, and
    - Microsoft Office suite,
    - Dell computer is mentioned but it is not a requirement (the way the CBC article initially mentioned it it was misleading)
     
    Between: Dec. 23, 1998 and March 11, 2010.
     
    Can make a claim.
     
    This follows from similar issues that occurred in the US with DOJ.
     
    The documentation requirements for these claims will be mostly just a sworn statement as it is unlikely users will have all the documentation necessary.
     
    You have until Sept. 23, 2021 to file a claim.
     
    Quotes
     
    My thoughts
    This is mostly for tech people in Canada, also LMG staff as this applies to only Canadians. But it is noteworthy that the claim period goes back to 1998, as many of the viewers of this 'channel' were probably born around this period.
     
    Sources
    CBC Article
  19. Informative
    WillyW got a reaction from zeusthemoose in Microsoft settles a Canadian Class Action lawsuit for Dell computers purchased from 1998 onward   
    Summary
    Microsoft has settled a class action lawsuit with a total payout of $517M, with $400M going to consumers. To date 100K people have filed claims.
     
    Consumers who purchased:
    - Microsoft OS, and
    - Microsoft Office suite,
    - Dell computer is mentioned but it is not a requirement (the way the CBC article initially mentioned it it was misleading)
     
    Between: Dec. 23, 1998 and March 11, 2010.
     
    Can make a claim.
     
    This follows from similar issues that occurred in the US with DOJ.
     
    The documentation requirements for these claims will be mostly just a sworn statement as it is unlikely users will have all the documentation necessary.
     
    You have until Sept. 23, 2021 to file a claim.
     
    Quotes
     
    My thoughts
    This is mostly for tech people in Canada, also LMG staff as this applies to only Canadians. But it is noteworthy that the claim period goes back to 1998, as many of the viewers of this 'channel' were probably born around this period.
     
    Sources
    CBC Article
  20. Informative
    WillyW got a reaction from Taf the Ghost in Microsoft settles a Canadian Class Action lawsuit for Dell computers purchased from 1998 onward   
    Summary
    Microsoft has settled a class action lawsuit with a total payout of $517M, with $400M going to consumers. To date 100K people have filed claims.
     
    Consumers who purchased:
    - Microsoft OS, and
    - Microsoft Office suite,
    - Dell computer is mentioned but it is not a requirement (the way the CBC article initially mentioned it it was misleading)
     
    Between: Dec. 23, 1998 and March 11, 2010.
     
    Can make a claim.
     
    This follows from similar issues that occurred in the US with DOJ.
     
    The documentation requirements for these claims will be mostly just a sworn statement as it is unlikely users will have all the documentation necessary.
     
    You have until Sept. 23, 2021 to file a claim.
     
    Quotes
     
    My thoughts
    This is mostly for tech people in Canada, also LMG staff as this applies to only Canadians. But it is noteworthy that the claim period goes back to 1998, as many of the viewers of this 'channel' were probably born around this period.
     
    Sources
    CBC Article
  21. Funny
    WillyW got a reaction from DededeKirby in Someone in China overclocked a 2006 Celeron to 8.3 Ghz as reported to hwBot   
    Summary
    User ivanqu0208 from China overclocked a Intel Celeron D 347 to 8362.21 mhz with what looks like a paper cup and ln2, and a Asus P5E64 WS Professional motherboard. While he didn't achieve the world record for that processor nor absolute highest CPU overclock, it was an impressive effort.
     
    Quotes
     
    My thoughts
    With the given shortages of all things gaming processors, now might be the best time to browse on eBay and find some old hardware to try to overclock.
     
    Sources
    Gizmodo article
    HWBot
    Techspot



  22. Funny
    WillyW got a reaction from soldier_ph in Someone in China overclocked a 2006 Celeron to 8.3 Ghz as reported to hwBot   
    Summary
    User ivanqu0208 from China overclocked a Intel Celeron D 347 to 8362.21 mhz with what looks like a paper cup and ln2, and a Asus P5E64 WS Professional motherboard. While he didn't achieve the world record for that processor nor absolute highest CPU overclock, it was an impressive effort.
     
    Quotes
     
    My thoughts
    With the given shortages of all things gaming processors, now might be the best time to browse on eBay and find some old hardware to try to overclock.
     
    Sources
    Gizmodo article
    HWBot
    Techspot



  23. Funny
    WillyW got a reaction from sub68 in Someone in China overclocked a 2006 Celeron to 8.3 Ghz as reported to hwBot   
    Summary
    User ivanqu0208 from China overclocked a Intel Celeron D 347 to 8362.21 mhz with what looks like a paper cup and ln2, and a Asus P5E64 WS Professional motherboard. While he didn't achieve the world record for that processor nor absolute highest CPU overclock, it was an impressive effort.
     
    Quotes
     
    My thoughts
    With the given shortages of all things gaming processors, now might be the best time to browse on eBay and find some old hardware to try to overclock.
     
    Sources
    Gizmodo article
    HWBot
    Techspot



  24. Funny
    WillyW got a reaction from thechinchinsong in Someone in China overclocked a 2006 Celeron to 8.3 Ghz as reported to hwBot   
    Summary
    User ivanqu0208 from China overclocked a Intel Celeron D 347 to 8362.21 mhz with what looks like a paper cup and ln2, and a Asus P5E64 WS Professional motherboard. While he didn't achieve the world record for that processor nor absolute highest CPU overclock, it was an impressive effort.
     
    Quotes
     
    My thoughts
    With the given shortages of all things gaming processors, now might be the best time to browse on eBay and find some old hardware to try to overclock.
     
    Sources
    Gizmodo article
    HWBot
    Techspot



  25. Funny
    WillyW got a reaction from Mark Kaine in Someone in China overclocked a 2006 Celeron to 8.3 Ghz as reported to hwBot   
    Summary
    User ivanqu0208 from China overclocked a Intel Celeron D 347 to 8362.21 mhz with what looks like a paper cup and ln2, and a Asus P5E64 WS Professional motherboard. While he didn't achieve the world record for that processor nor absolute highest CPU overclock, it was an impressive effort.
     
    Quotes
     
    My thoughts
    With the given shortages of all things gaming processors, now might be the best time to browse on eBay and find some old hardware to try to overclock.
     
    Sources
    Gizmodo article
    HWBot
    Techspot



×