…just this guy, you know.

  • 0 Posts
  • 37 Comments
Joined 1 year ago
cake
Cake day: May 7th, 2023

help-circle
  • as is traditional, one of our corporate innovators seeks to protect citizens (never simply consumers, no, no!) with a defensive patent - sure to now be locked away in a safe until natural corporate patent expiration 1000 years hence.

    now and forevermore we shalll sing in praise of this beneficent corporate citizen and their efficacious lawyerly thrust deep into the heart of our once inevitable (but now vanquished) future boring dystopia of ads beamed directly into our brains 24/7.




  • no worries.

    the net effect of client separation is that your device sees no other layer 2 devices on the wlan besides the gateway. this would typically be enforced at the frame level by the APs and is separate from any radio privacy cryptography.

    a properly configured wireless setup would assume every client is compromised and would also disallow local client-client via source routing or proxy ARP or any other escape options. 100% secure? probably not, but its a non trivial barrier that would have to be circumvented.

    as with e.g. broken WEP years ago, there are still options to mess with clients at ~Layer 1 but I dont believe its currently as trivial as it used to be.



  • I would say yes. I have never used a pure sinewave UPS outside of a data center situation and all of those are on-line units as opposed to line-interactive anyway. I have personally never seen an issue with stepped sine UPS units on typical pro/consumer workloads.

    lots of small and mid sized shoestring budget deployments make use of “economical” (but name brand) UPS units on legit sensitive equipment without fuss.

    edit to add: of course, if your mains supply is absolute garbage, then a better quality can make a difference. if utility is clean and the UPS will just be doing ocassional brown/black out duty, then I would not spend more on a sinewave UPS.








  • I know this may be pedantic, but

    it’s just that the newer phones are secure… For now.

    that statement suggests that other recovery techniques (e.g. hardware decaping, state zero-days, etc), dont already make absolutely current devices insecure.

    it would not surprise me that a TLA with physical access could not recover enclave information and completely expose naked storage in 2 days or less - its just a matter of how urgent is. a former president nearly loosing their head might count as pretty damn urgent. meddle with the us power structure and it will protect itself - if not the particular individuals.

    if you noticed any power dips in your area right after the attempt on trump, that was probably the local NSA cluster firing up.