Yeah. Shockingly people store things where it is convenient to have them. :) I’m glad I didn’t have a keyless system to with about.
Yeah. Shockingly people store things where it is convenient to have them. :) I’m glad I didn’t have a keyless system to with about.
I did read the article. I’m unfamiliar with the “hacking” tools or methods they mention given they use terms like emulator. I was simply sharing one wireless attack that is common in certain areas and why.
I think most of the wireless attacks aren’t trying to be so sophisticated. They target cars parked at home and use a relay attack that uses a repeater antenna to rebroadcast the signal from the car to the fob inside and vice versa, tricking the car into thinking the fob is nearby. Canada has seen a large spike in this kind of attack. Faraday pouches that you put the fob inside of at home mitigates the attack.
I’m not sure about what the article is referencing, which is probably a little more exotic, but relay attacks are very common against keyless cars. Keyless cars are constantly pinging for their matching fob. A relay attack just involves a repeater antenna held outside the car that repeats the signal between the car and the fob inside the house. Since many people leave the fob near the front of the house, it works and allows thieves to enter and start the car. Canada has has a big problem with car thieves using relay attacks to then drive cars into shipping containers and then sell them overseas.
With coffee all things heart palpations are possible. It took me about a year and a half between work and studies. Definitely not a day. 😀
That’s awesome, but no, they made something far more useful, lol. I’m glad to see projects like that though; it’s a lost art!
Years and years ago I built my own 16 bit computer from the nand gates up. ALU, etc, all built from scratch. Wrote the assembler, then wrote a compiler for a lightweight object oriented language. Built the OS, network stack, etc. At the end of the day I had a really neat, absolutely useless computer. The knowledge was what I wanted, not a usable computer.
Building something actually useful, and modern takes so much more work. I could never even make a dent in the hour, max, I have a day outside of work and family. Plus, I worked in technology for 25 years, ended as director of engineering before fully leaving tech behind and taking a leadership position.
I’ve done so much tech work. I’m ready to spend my down time in nature, and watching birds, and skiing.
The article says that steam showing a notice on snap installs that it isn’t an official package and to report errors to snap would be extreme. But that seems pretty reasonable to me, especially since the small package doesn’t include that in its own description. Is there any reason why that would be considered extreme, in the face of higher than normal error rates with the package, and lack of appropriate package description?
Thanks for the article, it was a fun read. I’ll have to go back and re-read the majority opinion because I do remember some interesting analysis on it even if I disagree with the outcome.
While not related from a legal standpoint, the use of iPhones and intermediate devices reminds me of a supreme Court case that I wrote a brief about. The crux of it was a steaming service that operated large arrays of micro antenna to pick up over the air content and offer it as streaming services to customers. They uniquely associated individual customers with streams from individual antenna so they could argue that they were not copying the material but merely transmitting it.
I forget the details, but ultimately I believe they lost. It was an interesting case.
I’ll give you some general advice and am happy to answer any follow up questions you might have.
Upfront, I recommend getting a laptop from a well known vendor running Windows. If you aren’t looking to go on a technology learning expedition, just need something that will work, and will have a warranty and a support line if things go wrong, you can’t beat a vendor. Dell is probably where I would look, but Microsoft surface, and Thinkpad’s are also good.
Going with Windows from a vendor supplied laptop will maximize the amount of support you have and the number of things that just work.
If you are looking for more of a technology project, I’d need to know more about what your tolerance is for fiddling with technology or your computer not working.
As for CAD, as others said, check the recommended software specs and match your computer to them. Make sure you give yourself plenty of fast storage like m.2.
For browsers, I use Firefox. I’d recommend Firefox as being a good balance between privacy and just working with plugin support. But chrome and other chromium based browsers like edge also just work.
Consider getting a Microsoft 365 personal or family account. For $100/year you get cloud storage, computer backups, and the local and online office suite, and it all integrates well into Windows.
If any of the above assumptions are wrong, I’m happy to update recommendations.
Finally, how do you learn to fish? It takes time to come up to speed on things, so slowly learning, finding neutral review sites like maybe Tom’s hardware, and doing your own testing.
Lots of people will give you opinionated advice, so don’t be afraid to be skeptical. Think about what’s important to you, whether that be just working, or privacy, or availability of support materials.
I don’t disagree that comment OP could have phrased it better and come across as less judgey. And I think that of someone like you left a well worded reply to the effect that it would be very fair feedback.
At the same time I feel like some of the comments she has gotten are living down to the less generous version of her statements. If that makes sense. It also sort of feels like people wallpapering over the underlying reason that many women look for social media participation, which is as a way to vet for safety reasons.
But I agree, it’s not good to typecast and overgeneralize, and a better suggestion to the post OP might be that some women look for social media accounts for safety reasons, if that is part of your social issues mentioned.
But I digress. Have a great day!
deleted by creator
I love that your post gave a probabilistic binning of someone who doesn’t have a traditional social media account, which was unironically confirmed by people replying with rustled jimmies.
Come on folks, it should be clear from context that she is saying that a single woman setting up dates is going to use what limited info they have to avoid stalkers, cheaters, red pillers, and anti social people. That this might filter out perfectly normal people along with the creeps is the cost of maintaining safety and not wasting time, which is pretty much par for the course in dating. There’s also a difference between exchanging info after a brief meeting, and actually knowing a person for an extended time and then dating. I doubt OP is saying that someone they studied with for three semesters would be excluded for lack of social media, because they have real life context and don’t need the proxy filters.
Also, getting real close in these replies to “but I’m a nice guy” and “I’m not like other girls.”
I thought I was taking crazy pills watching people tell the guy not to join social media, on a social media site!
I think the real question being asked is, should the OP make a social media account that is not anonymous or on one of the mainstream sites. Which I would say go for it if it helps with your IRL social life, just don’t post anything you wouldn’t say in person in public.
Lol, yep. Twenty years give or take testing just about everything along the way. 😂
I have to admit I used FreeBSD as my daily driver years ago. But I’ve also used everything else in the list at one point or another.
I use a terminal whenever I’m doing work that I want to automate, is the only way to do something such as certain parameters being cli only, or when using a GUI would require additional software I don’t otherwise want.
I play games and generally do rec time in a GUI, but I do all my git and docker work from the cli.
Congrats on both!
Hey, sorry it took so long to see your question. Here is a paper (PDF) on the subject with diagrams.
https://www.research-collection.ethz.ch/bitstream/handle/20.500.11850/42365/eth-4572-01.pdf
Edit: and here is a times article that covers the problem in one area. https://www.nytimes.com/2024/02/24/world/canada/toronto-car-theft-epidemic.html