Remember that I’m a nihilist and shrug my shoulders.
Then start to think about how everyone else is going to react and how I’ll need to plan for that.
Remember that I’m a nihilist and shrug my shoulders.
Then start to think about how everyone else is going to react and how I’ll need to plan for that.
You laugh, but there are some OLEDs out there that can do it. Not scaled down to phone size yet, though.
Accelerationism refers to the idea of intentionally making capitalism the worst version of itself so that people have to revolt. It doesn’t work; it makes everything worse without accomplishing the end goal. Generally, the people making these arguments aren’t coming right out and saying they’re accelerationists, but they get there indirectly.
People won’t bring the revolution just because things are bad. You need class consciousness first.
It’s important to note that TDP is a very fuzzy number. It has no industry-wide standard definition, and manufacturers play with the formula for their own products all the time. At best, it gives you a ballpark estimate of what cooler and PSU you’re going to need, and some would dispute even that.
It’s generally one piece of software, a browser extension, that works for all. Even mobile apps are often just webpages with extra steps, so the code base is the same.
The underlying storage must be encrypted the same way on each.
Yes, there are still potentially issues. I’ll come back to what I said at the start: passwords are a bad system in general, all methods for handling them are flawed, but password managers have the fewest flaws.
Quite a few. Data dumps of passwords from sites can be from sites that used full hashing. If you used a fully random password of at least 20 characters, even unsalted md5 storage would be unbreakable.
What an idiotic argument, the level of entropy comes from the rules first and foremost, putting a 1 and an A together is the exact same entropy as using 2 and B.
Oh dear, no. You cannot match a cryptographic (P)RNG for generating passwords. Not even close.
In 2.5 years, the EV market will look very different. Just the last year has shifted a lot around with the used market (such as Hertz cycling out a bunch of Teslas and offloading them cheap).
I’ve driven from Madison, WI to Chicago in an EV with ~100 mile range in cold weather. Wouldn’t be my first choice, but I was in a pinch at the time. It can work, but getting a reliable charger network is the biggest problem. Made three stops to chargers that were broken or inaccessible for various reasons.
That was a couple of years back, and I think it’d go a bit smoother now. The Chicagoland area has reasonably good charger network outlays (much better than Minneapolis, which is a joke). Still wouldn’t be my first choice, but it’s workable.
Which have a whole bunch of issues of their own. Like increased mechanical complexity, and that you might use gas so seldom that it becomes significantly water by the time you do need it.
Yeah, that’s going to be a terrible system. The human brain isn’t capable of keeping track of enough entropy to create a secure password system.
More generally, it’s a big red flag when anybody thinks they can make a better system than publicly available and verified systems. You’re not capable of that, I’m not capable of that, Bruce Schneier is not capable of that. No matter how smart you are, you missed something. That’s why I didn’t need to know a single detail.
Nvidia claims the 5070 will give 4090 performance. That’s a huge generation uplift if it’s true. Of course, we’ll have to wait for independent benchmarks to confirm that.
The best ray tracing games I’ve seen are applying it to older games, like Quake II or Minecraft.
Scalpers were basically non existent in the 4xxx series. They’re not some boogieman that always raises prices. They work under certain market conditions, conditions which don’t currently exist in the GPU space, and there’s no particular reason to think this generation will be much different than the last.
Maybe on the initial release, but not for long after.
My personal system has guaranteed no vulnerabilities
If you think that’s true, then you don’t have the experience to make a secure system.
Passwords suck as an authentication system in general. Your own system is probably worse than what password managers do. Yes, there are problems, but so does every other solution to this, and password managers win out in the comparison.
Bcrypt/Scrypt have a 72 byte limit. Developers can get around that by putting it through a regular hash first, but that’s not common.
State actors don’t generally need to break passwords. They ask the company “nicely” and they get what they want. The exception would be if that password is being used to encrypt data.
The specific example I’m thinking of is DES. They messed with the S-boxes, and nobody at the time knew why. The assumption was that they weakened them.
However, some years later, cryptographers working in public developed differential cryptanalysis to break ciphers. Turns out, those changed S-boxes made it difficult to apply differential cryptanalysis. So it appears they actually made it stronger.
But then there’s this other wrinkle. They limited the key size to 56-bits, which even at the time was known to be too small. Computers would eventually catch up to that. Nation states would be able to break it, and eventually, well funded corporations would be able to break it. That time came in the 90s.
It appears they went both directions with that one. They gave themselves a window where they would be able to break it when few others could, including anything they had stored away over the decades.
That’s the trubble with the NSA. They want to spy on people, but they also need to protect American companies from foreign spies. When you use their stuff, it’s hard to be sure which part of the NSA was involved, or if both were in some way.
It’s something like the second law of Thermodynamics. It’s probability, not absolute. It’s possible all the gas molecules in the room arrange themselves one corner, but it’s fantastically unlikely. It’s possible to choose the right encryption key to a 256-bit cipher at random the first time, but it’s fantastically unlikely.