A 4D printer would need to know the time.
- 0 Posts
- 22 Comments
TaviRider@reddthat.comto
Privacy@programming.dev•Google Starts Sharing All Your Text Messages With Your Employer
241·2 months agoThis RCA message archiving feature is on “fully managed” Pixel devices, which are COBO: corporate owned, business only. You shouldn’t be doing anything personal on such devices.
There’s also “work profile” which is a different kind of management for mixed personal and work use. With work profile, the admin has no visibility into the personal side of the device.
It’s simplest and safest to follow what you wrote and never bring personal and work anywhere near each other. But there’s downsides to that, like having to carry two phones. I think there’s some situations where most people will feel safe doing personal things on a work device.
TaviRider@reddthat.comto
Ask Science@lemmy.world•Could Quantum Computing be accurately described as being "binary fractals"?English
9·3 months agoNo. Fractals are self-similar at different scales. I’m not aware of anything like that in quantum computers, theoretical or actual.
TaviRider@reddthat.comto
Gaming@lemmy.ml•(Spoiler Thread) Your top 10 video game protagonist deaths
2·3 months agoSeveral of my top ten are from Dragon’s Lair.
Previously discussed three months ago at lemmy.ml/post/33176527. Not sure how to format that link correctly though…
TaviRider@reddthat.comto
Privacy@programming.dev•New US Bill Aims to Block Both Online Adult Content and VPNs
10·4 months ago[The bill] includes language that could ban not only VPNs but any method of bypassing internet filters or restrictions.
It sounds to me like I2P and tor would also be illegal.
It’s called constructive dismissal.
Stingray phone trackers and similar IMSI catchers are a kind of honeypot.
ANOM wasn’t until it was, and then it shut down. I recommend the Darknet Diaries episode to hear the story.
TaviRider@reddthat.comto
Reddthat Announcements@reddthat.com•Reddthat Update: August 2025English
3·6 months agoAccording to https://reddthat.com/post/25633 there’s payment options for librepay, ko-fi, and a few different crypto options. This post mentions ~A$22/week in total income revenue, which matches what librepay reports. What’s the income from all the other sources? Are they all ~A$0?
We secure your account against SIM swaps…with modern cryptography protocols.
This just dosent make ANY sense. Sim swaps are done via social engeneering.
See this for details. Their tech support people do not have the access necessary to move a line so there’s nobody to social engineer. Only the customer can start the process to move a line after cryptographic authentication using BIP-39.
proprietary signaling protection
If they wanted to be private, it would be Open source.
I’m really tired of this trope in the privacy community. Open source does not mean private. Nobody is capable of reviewing the massive amount of code used by a modern system as complex as a phone operating system and cellular network. There’s no way to audit the network to know that it’s all running the reciewed open source code either.
Voicemails can hold sensitive information like 2FA codes.
Since when do people send 2fa codes via voicemail? The fuck? Just use signal.
There are many 2FA systems that offer to call your number so the system can tell you your 2FA code.
The part where I share your reaction to Cape is about identifying customers. This page goes into detail about these aspects, and it has a lot of things that are indeed better than any other carrier out there.
But it’s a long distance short of being private. They’re a “heavy MVNO”. This means their customers’ phones are still using other carriers’ cell towers, and those can still collect and log IMSI and device location information. Privacy researchers have demonstrated that it is quite easy to deanonymize someone with very little location information.
On top of that, every call or text goes to another device. If it goes through another core network, most call metadata is still collected, logged, and sold.
If we accept all of Cape’s claims, it’s significantly better than any other carrier I’m aware of, but it’s still far from what most people in this community would consider private.
TaviRider@reddthat.comto
News@lemmy.world•Tesla just reported its biggest quarterly drop in deliveries ever
71·7 months agoIn market terms, bad news was already priced in. The fact that the steep drop wasn’t as bad as some analysts predicted means it was better news than expected, so the stock went up a bit.
TaviRider@reddthat.comto
Sysadmin@lemmy.world•Rogue IT worker gets seven months in prison over $200,000 digital rampage — technician changed all of his company's passwords after getting suspended
1·7 months agoIt’s usually harder to do for admins. They’re usually the ones who do the suspending.
TaviRider@reddthat.comto
No Stupid Questions@lemmy.world•How does Apple make its infomercial animations to be identical to its software UI?
3·7 months agoUI designs are rarely exactly the same as the final product. There’s many tweaks that occur after the design is implemented. Sometimes doing exactly what the design requiress is too difficult or requires too many resources.
TaviRider@reddthat.comto
No Stupid Questions@lemmy.world•How does Apple make its infomercial animations to be identical to its software UI?
20·7 months agoI’ve presented a few WWDC sessions including two video sessions, though nothing as huge as the keynote or platform state of the union. I can answer most questions you have about the process.
The screens shown in WWDC sessions are usually screen captures from real devices. Development of the slide decks starts with a template deck that has the styles, fonts, and color themes for that year’s sessions. It includes slides that look like the latest devices, with precise rectangles the right size where screen captures will fit. As people develop their sessions they use these slides as placeholders for screenshots, animations and videos.
During development of the OSes the code branches for what will become the first developer seed. Before WWDC, one of the builds of this branch gets marked as ready for final screenshots/videos. The idea is that the UI is close enough to what will ship in the first developer seed that the OS and sessions will match.
Once that build is marked, the presenters take their screenshots and those get incorporated into the slides.
You wrote “It wasn’t just a screen recorder thing”. What makes you say that?
You asked about specialized software. Apple OS engineers have to use what are called “internal variants” of the OSes during development. These have special controls for all sorts of things. One fun thing to look for in WWDC sessions: the status bar almost always has the same details, with the same time, battery level, Wi-Fi signal strength, etc. These are real screenshots, but the people taking the videos used special overrides in the internal variants to force the status bar to show those values rather than the actual values. That makes things consistent. I think it avoids weird things like viewers being distracted by a demo device with a low battery.
Cats here, cats there, Cats and kittens everywhere. Hundreds of cats, thousands of cats, Millions and billions and trillions of cats
TaviRider@reddthat.comtoLibreByte@lemmy.ml•The fastest way to detect a vowel in a string
2·7 months agoThe recursive solution could have used tail recursion to operate on strings of any size without using O(n) stack space. By just incrementing the string pointer it could do it with just one string buffer too.
TaviRider@reddthat.comto
Technology@lemmy.world•Palantir may be engaging in a coordinated disinformation campaign by astroturfing these news-related subreddits: r/world, r/newsletter, r/investinq, and r/tech_newsEnglish
5·8 months agoit’s sociopaths who lack empathy. And that leaves them behaving like capuchins. The one on the left is upset at the unfairness. But the one on the right doesn’t care at all. It just keeps taking its unfair advantage.




Unexpected to AI true believers.