

Could you explain how it doesn’t undermine your argument?


Could you explain how it doesn’t undermine your argument?


I think the term you are looking for is “Deep Net”, although it originally meant websites that weren’t indexed by web searches.


Not only that, but they are crucial for network security. VPNs allow all network traffic (with a few necessary exceptions) to be routed through the company’s network and benefit from its security measures, mainly monitoring traffic for suspicious and malicious behaviour. Without it, finding compromised PCs is much harder and enforcing company policies regarding web use would be impossible outside the office.


One company that I can recommend is Withings. They do have an companion app, but a lot of devices do work on their own, and when not, they work with Google Fit or HomeAssistant, though probably due to that fact the products are pricier.


Interestingly enough, reducing road capacity has the polar opposite effect - demand lowers until it about matches the relative congestion of before.
I’d argue most people just aren’t parasitic enough to willingly exploit both their sellers, workers and customers in the scale of how Amazon did and still does.


But do you also sometimes leave out AI for steps the AI often does for you, like the conceptualisation or the implementation? Would it be possible for you to do these steps as efficiently as before the use of AI? Would you be able to spot the mistakes the AI makes in these steps, even months or years along those lines?
The main issue I have with AI being used in tasks is that it deprives you from using logic by applying it to real life scenarios, the thing we excel at. It would be better to use AI in the opposite direction you are currently use it as: develop methods to view the works critically. After all, if there is one thing a lot of people are bad at, it’s thorough critical thinking. We just suck at knowing of all edge cases and how we test for them.
Let the AI come up with unit tests, let it be the one that questions your work, in order to get a better perspective on it.


Honestly, I think that this was a horrid read. It felt so unfocused, shallow and at times contradictory.
For example, at the top it talked about how software implementation has the highest adoption rate while code review/acceptance has the lowest, yet it never really talks about why that is apart from some shallow arguments (which I will come back later), or how to integrate AI more there.
And it never reached any depth, as any topic only gets grazed shortly before moving to the next, to the point where the pitfalls of overuse of AI (tech debt, security issues, etc.) are mentioned, twice, with no apparent acknowledgement of its former mention, and never mentioned how these issues get created nor show any examples.
And what I think is the funniest contradiction is that from the start, including the title, the article pushes for speed, yet near the end of the article, it discourages this thinking, saying that pushing dev teams for faster development will lead to corner cutting, and that for a better AI adoption one shouldn’t focus on development speed. Make up your damn mind before writing the article!


I haven’t watched the video yet, but I think TADC has unwillingly joined the “kids” content mill, which is probably what might be referenced.
Even Gooseworx dislikes how those content mill channels have abused TADC’s popularity for their own profit while neither she nor Glitch can do much about it.
Funnily enough, Signal has circumvented the issue by marking their chat window as DRM content, making it invisible to Recall.
I’m not the one who you asked, but I’d still give some feedback of my own. Musk as a person is a difficult character. I would even go as far as calling him narcissistic.
I generally can’t trust someone who seems to put himself first at everything to handle anything related to security when the role allows him to exploit it for his own gains. And I do not trust someone who supports political groups known for trying to oppress minorities to defend actual rights for free speech.
The question is whether this actually is E2EE, as it’s easy to fake by using a man in the middle attack and hard to prove. The only real way to prove it for sure is to run a third party security audit, like Signal does.
Taking down the old system doesn’t inspire confidence either, as this downtime could easily been used to interrupt old conversations in order to implement a way to decrypt the messages on the servers before passing it on to the actual recipient, as all keys would have to be re-issued.
Honestly, Telegramm always seemed to me a bit shifty since I learnt E2EE for chats was opt-in.


You are forgetting targeted attacks. A blind attack would pretty much not have much of an effect indeed, however if the attacker knows the machine, then it’s easy for the attackers to exploit these vulnerability if left “out in the open”, and cause havoc, possibly create a lot of damages or leech informations pumped into those machines via old Windows installations.
Quick question about the overwrite passes: is it overwritten with random numbers or is there a sequence of passes?
Is there a benefit from this over the inbuilt Secure Erase functionality in most SSDs/NVMEs? To my knowledge, it instantly dumps the current from all cells, emptying the data on it.
Furthermore, another issue with SSDs/NVMEs is that it automatically excludes bad blocks, meaning that classic read/write operations can’t even reach those blocks anyways. Theoretically that feature could also be used against you to preserve the data on the disk by marking all blocks as bad, rendering them as inaccessible by the file system.
Of course there’s also the issue of Secure Erase not being implemented properly in some drives, leading to the bad blocks not being touched by the hardware chip during that procedure.
Though this solution also seems to be very flawed, doesn’t it? You basically trust another company to manage your child’s smartphone and granting it full access to it. Furthermore, that doesn’t stop predators, as they could still arrange meetups with their unknowing victims. And even if it captures text messages, kids would be discouraged to use their phone due to their fear of their parents disproving of their friends or their communication to them. Instead, they’d more likely learn the use of “burner phones” by getting a factory-reset phone and using that one instead.
It’s the sort of ham-fisted attempt expected by parents that blame their kids for their mistakes instead of their parenting.