Maybe they’re not as smart as you’d like.
You think I want them to be smart? Lol.
Something controversial happens -> a lot of people get pissed off (understandably so) -> media milks the shit out of the event -> narratives - true, false, embellished, whatever get created -> mischaracterization for anyone who’s approach to handling the situation isn’t in line with majority rule, blah blah blah -> the bad guys (usually) walk away fine.
That’s a very common cycle.
I wasn’t happy with what happened, but it’s been 2 months at this point, and what I’ve gathered is that nothing is going to change.
And yet because I say that these protests are fruitless people get mad and go absolutely nuts on the downvote button.
Sorry, I was under the impression we could have an open discussion without making assumptions in bad faith about people who disagree with the rationale.
My bad 🤚
Where is the incompetence? His competency is dependent on making money for a specific few.
It has nothing to do with the outcome of the site, beyond how that outcome influences said making of money.
If the shareholders cash out happy and the site dies out, he did his job, regardless of whether or not you think that’s fair.
Yes, it sucks for the rest of us who liked Reddit. I am one of those people.
Saying this guy is incompetent just because his interests go against the interests of people who use Reddit is ludicrous.
The interests are in conflict, it sucks. That’s it. We have Lemmy. Get over it.
but I was trying to imply, in a properly generated password, 32 digits long is very secure.
I understand, and I think you make a valid point as far as the discussion is concerned.
It’s unfortunately still a little more complicated than that, though.
Like I said, there’s more to a password than length and symbol type.
Even something like cF*+@aXbIdFHje2vZiU-1 is less secure than if it were generated by a good PRNG.
D0@ndro!dsDr@3@m0f3l3ctr!cSh33p? is also insecure, though it might have been considered secure 4-5 years ago.
You see what I’m saying?
Then of course there’s hash algorithms and how those are used to authenticate the passwords themselves, etc.
I’ve heard people say it can enable back door access, but it’s only been rumors and hypotheticals based on its access rights.
Out of curiosity, how is your knowledge?
If it can for example enable your webcam without any type of notification it’s happening that would be very concerning.
From a theoretical standpoint, given that it apparently has access to the same physical memory, all that would be needed is to know the correct memory addresses to read a single frame from.
How the kernel allocates that and maps it appropriately is both driver-specific and OS-specific.
Technically speaking, it could be that there are specific pools of physical addresses reserved for such things. The vram for an integrated card has at least a portion which is typically shared, so that’s worth taking into account as well, because the boundaries could be device specific or standard specific.
I’d personally have to research more myself, but if we’re operating off of Murphy’s law, then I’d wager that, yes, it’s very possible. Perhaps even if your kernel module for the camera driver is disabled by the host OS.
It’s certainly possible that the IME lane access is restricted in terms of what IO will be considered valid, but given that it isn’t documented, and given that it runs a multitasking, Unix-OS…that alone says a lot. Maybe not enough to be certain, but a lot.
Previously it was running an RTOS. So, you have constant time tasks. Now that it isn’t running an RTOS, there has to be a reason. Maybe it’s designed to aid branch prediction - if it is, though, then it probably has access to the instructions that are being executed by the host CPU. If that’s the case, then that implies that there are restrictions in the page mapping mechanism with respect to what physical addresses can be virtually mapped - assuming any protection at all.
You see where I’m going with this?
Yes, IME.
Has that been proven to allow this type of access where they can enable the webcam or microphone without user permission?
It can read from your memory. It has access to the PCI bus. It runs in ring -3. Apparently it also runs MINIX.
It can operate without you being aware of what it’s doing.
So, yes.
wym just
def piss(): pass
substitute accordingly 🤙