This server, maintained by Internet carrier Cogent Communications
Found the problem!
So the article repeats, several times, “waymo relies on remote operators”. I don’t think the author knows what “self-driving” means.
Yahoo search is just reskinned Bing, if that matters to you.
Possible? Yes. Likely? Not at all.
To perform a zero knowledge proof, you’d have to have structured data to support the claim, which most whistleblowers would not have. If a whistleblower already had the hard evidence in hand, e.g., serial numbers and timestamps, they could have just provided those anonymously, and someone could follow up. The problem is, you can’t always get a copy of the hard evidence without revealing your intent to the employer, or at least, other employees.
Presumably most whistleblowers are making unsubstantiated claims that something happened, or maybe with light evidence. Based on who they are, a journalist or investigator may then elect to follow up and dig up the hard evidence to support the claim. This requires revealing your name and position/relationship to at least one person. Rarely, they would be willing to put themselves out there to provide an affidavit under oath, which itself is not enough to pursue criminal charges (though it could help build a case around intent or willful neglect, or help support a warrant or discovery).
It’s illegal, but not unheard of, to try to force journalists to reveal their sources, but the same protections are not universally in place if you reported a finding to a company’s internal affairs, for example. But unlike attorney-client privilege, or shield law protections, the risk in signing an affidavit is, as we’ve seen in recent US trials, that records will not stay sealed, and your name will be revealed to the defense and/or public.
As far as people I’d trust to not just make shit up, I’d say Librarian, aka, professional fucking researcher is high on the list.
For encryption, the client and server need to share their private keys.
This is incorrect, for asymmetric (public-private) encryption. You never, ever share the private key, hence the name.
The private key is only used on your system for local decryption (someone sent a message encrypted with your public key) or for digital signature (you sign a document with your private key, which can be validated by anyone with your public key).
For the server, they are signing their handshake request with a certificate issued by a known certificate authority (aka, CA, a trusted third party). This prevents a man-in-the-middle attack, as long as you trust the CA.
The current gap is in inconsistent implementation of Organization Validation/Extended Validation (OV/EV), where an issuer will first validate that domains are legitimate for a registered business. This is to help prevent phishing domains, who will be operating with TLS, but on a near-name match domain (www.app1e.com or www.apple.zip instead of www.apple.com). Even this isn’t perfect, as business names are typically only unique within the country/province/state that issues the business license, or needed to be enforced by trademark, so at the end of the day, you still need to put some trust in the CA.
Probably a good change. Most legitimate bulk email messaging probably goes through a third party service already in your SPF record; surveymonkey, listserv, etc.
For your last two questions, the counterpoint is, if even Microsoft can’t stop a dedicated nation state, how can any other major service provider say they haven’t been compromised?
The standard now is, assume breach. While unfortunate, the industry average for MTTD is in months. Microsoft was at least good enough to detect it within six.
Can Broadcom or Palo Alto say the same? Amazon, Google, Apple, Cisco?
While true, it’s pretty asinine to hold companies operating in China accountable for complying with Chinese law. It sucks, but they aren’t just going to abandon the Chinese ~cash cow~ market.
Link to source article. The linked article steals the text and images verbatim.
The games in progress I mark as favorites, I have “Finished” and “Play Next” categories, and I have a big dump category called “Won’t Play”.
Aside from that, I have some big categories for collections of old games from humble bundles and steam sales, like legacy Myst, Wizardry, or Sierra games, or like Star Wars game collections.
I was beyond disappointed to see this. I have limited time to fire up my PC at home, so was looking forward to being able to finally play this game, on mobile, during travel.
This is really not the incentive their leadership thinks it is. The top performers absolutely will be eligible for promotion… just not at Dell.
Who cares if the code is open source, or pre-training weights are released? Virtually every Masters in CS student in 2024 is building this from scratch. The differentiator is the training dataset, or at worst, the weights after fine tuning the model.
Okay, but how is it a trade violation?
Which is a trade violation for WTO members.
Curious to hear more about this. Are you saying subsidized products cannot be sold on the international market? Wouldn’t creative accounting solve this, e.g., buy saying that the subsidized portion is only available domestically, which reduces demand globally, thus lowering prices?
How diverse is your investment portfolio? How many different stocks and securities have you sold last year? Were these subject to short term or long term capital gains? Did you rebuy any of those, making the security subject to the wash rule?
If you have a family, a house, multiple W-2s, 1099s, a retirement account, and a 529, things are still pretty “simple”. TurboTax does not let you use their free file if you’ve traded stocks, but for most other products, even some low volume trading in a brokerage account is considered fairly standard.
At the end of the day, it comes down to how organized you are, and how much time it will take you to do data entry. Usually, your tax documents have clear headers, and usually, these match up to the fields in the tax application. But not always, and the more documents you have, the more hours it will take, and the more likely you are to run into a speed bump that will cause frustration.
So, how much is your time worth to you? If it’s worth more to you than the cost of a tax professional, it’s an easy decision.
That’s not true; the oligarchs control the present, and none of this negatively impacts them in any way. In fact, quite the opposite.
Sorry if I’m about 10 years behind Linux development, but how does Docker compare with the latest FlatPak trend in application distribution? How you have described it sounds somewhat similar, outside of also getting segmented access to data and networks.
Only the cyber truck. Model S and 3 refreshes are still on the legacy platform, with a lithium ion 12V.