deleted by creator
Just someone running away from Reddit.
deleted by creator
Article is still up, I dont really understand this post.
Not sure how rare they are, but I’ve seen wild crested caracaras a few times.
Why does the troll have to be european? Most of the world uses DD/MM/YYYY, or some variation of that order.
I can’t afford it, so I don’t have any insurance.
Aye.
I know somebody who has implated hearing aids. If they’re not a cyborg, I don’t know who is.
It boots with wifi on, but if you don’t connect to anything, you should be ok.
Fair, but my point still stands. The only way adguard is gonna have complete control, is by being sovereign.
Nah, codeberg is just another company, this could happen there just as it did on gh, granted it’ll be less likely to happen there. They need to move to git platform controlled by them.
I do hope this puts mozilla in a position where they have to improve firefox.
So far, yes, but it’s early days for it, and I suspect it will get harder and harder to keep up.
I’ll wait and see before I actually make a decision for real. But so far, not looking great.
I know, but that means it needs to keep its firefox source version up to date to keep up with security, and as its source diverges more and more from vanilla firefox, it’ll get harder to do that.
Plus they’ve already proved to be amateurs by enabling some things that really shouldn’t have been enabled: https://github.com/zen-browser/desktop/pull/927.
I’ve used it for a bit, and it’s really really nice. I just don’t know if I trust it to keep up with security updates, especially something so sensitive as a web browser.
There are a handful of repos that have also been updating the extensions too, so all good. Most active seems to be from keiyoushi.
Tachiyomi is dead, long live Tachiyomi.
That’s correct.
the boot keys are burned into OTP memory so they can’t be erased or changed
Which is good, as otherwise it would defeat the purpose of secure boot.
That’s usually not how secure boot is configured on microcontrollers. They usually come with no code installed and an unsigned bootloader, and therefore no barrier for you to flash what you want on it.
In fact, the STM32 has secure boot, and it’s still one of the most popular microcontrollers for makers and hackers. That’s because the secure boot feature is there for developers, hackers and makers to use if they want to.
RP2350 specs:
- Two 150MHz Arm Cortex-M33 cores, with floating point and DSP support
- 520KB of on-chip SRAM in ten concurrently accessible banks
- A comprehensive security architecture, built around Arm TrustZone for Cortex-M, and including:
- Signed boot support
- 8KB of on-chip antifuse one-time-programmable (OTP) memory
- SHA-256 acceleration
- A hardware true random number generator (TRNG)
- An on-chip switch-mode power supply and low-quiescent-current LDO
- Twelve upgraded PIO state machines
- A new HSTX peripheral for high-speed data transmission
- Support for external QSPI PSRAM
Looking pretty good. I especially like the security features.
Huh, I swear when I clicked the link it worked just fine though. Indeed, it seems to be down now.