Pretty sure this was described exactly in Snow Crash (Neal Stephenson, 1992).
Pretty sure this was described exactly in Snow Crash (Neal Stephenson, 1992).
I read the source code and this is a hobby-project that you could write in an afternoon with no knowledge of cryptographic protocols.
There are dozens of obvious deficiencies even to me and I am no expert in cryptography. An easy example to point out is that there is no input validation and no error checking or exception handling. Both the client and server just assume that the other side is a well-behaving correct implementation.
The author should not be posting this around as if it’s a serious tool for people to use. If anything it’s a starting point for OP to get advice from experts on how real systems do this properly. I’d recommend that the author spends a LOT of time reading before doing. There are numerous design documents of real systems and protocols, and some good comprehensive books too.
Sorry, there’s no way Qualcomm is buying Intel as is
At the end of its third quarter of its fiscal 2024, […] Qualcomm had $7.8 billion in cash and […] just over $23 billion in total assets. That means Qualcomm, […] is almost certainly looking at a stock-for-stock transaction. As of writing, Qualcomm’s market cap is $188 billion, just more than double that of Intel’s at $93 billion.
In fact, Chipzilla may not be worth much to Qualcomm unless it can renegotiate the x86/x86-64 cross-licensing patent agreement between Intel and AMD, which dates back to 2009. That agreement is terminated if a change in control happens at either Intel or AMD.
While a number of the patents expired in 2021, it’s our understanding that agreement is still in force and Qualcomm would be subject to change of control rules. In other words, Qualcomm wouldn’t be able to produce Intel-designed x86-64 chips unless AMD gave the green light.
The amount of advertising for this tool in recent times is starting to look a lot like astroturfing.
Not my post btw, just sharing the link :)
Sorry for the reddit link, I don’t know of a mirror. This was posted just today, running on an EeePC:
The binaries in question are various GNU and FOSS tools from elsewhere, not part of the Ventoy project itself. So no, the Ventoy author does not own the copyright of the tools in question.
I used Ubuntu from version 8.04 to 18.04 and not once did I have a successful upgrade between major versions. There is always something that gets broken to the point that a reinstall is necessary.
Got a link to that?
Can’t wait to read about it telling someone to put glue on pizza.
Note to readers: Don’t install python dependencies for random python projects of unknown provenance. PyPI is regularly being used as a vector for distributing malware. See recent news stories here: https://www.bleepingcomputer.com/tag/pypi/
You should manually check every package listed in requirements.txt and verify that it is a trustworthy python library.
deleted by creator
I can see that you’ve taken on a lot of the feedback from previous comments threads. This is great! Thank you.
And thank you for open sourcing it.
Question: I was using Quiblr before without logging in. If I sign up an account now and log in, will it transfer my locally stored data into the account to keep the recommendation (see more/see less) settings?
I think for now Forgejo is a drop-in replacement. However since they are a hard-fork, at some point in the future they will diverge enough to be mutually incompatible, so the clock is ticking on migrating.
I see this FUD all the time but nobody ever gives examples. Can you point to some specific sites that don’t work with Firefox?
This vuln is not new, it was published 3.5 years ago: https://nvd.nist.gov/vuln/detail/CVE-2020-26558