Forgot your password?
typodupeerror

Comment Re:What's the problem? (Score 1) 47

The problem is that he is an artist and needs to keep making money to get opportunities like this, so when critics pan his work and audiences react negatively, he feels the need to defend his decisions.

It sounds like he ripped off those people who take a podcast, add AI slop images, and upload a video to YouTube.

Comment Re:Rent-seeking (Score 2, Insightful) 333

The problem is Israel. Israel is everything the US claims to oppose Iran for.

- Nuclear armed, with the ability to deliver those warheads to Europe and beyond.

- The world's biggest state sponsor of terrorism.

- An existential threat to every other nation in the region, constantly attacking and invading them.

- Openly genocidal, has the means to actually do it, and is doing it.

- Abuses its own people.

If Israel wasn't based by the US and European nations, if we didn't tolerate Israel violating international law every single day for decades, Iran wouldn't be the problem that it is.

Comment Re:Rent-seeking (Score 1, Troll) 333

If the fees are lower than the cost of mitigating the problems it causes, they will probably just pay.

Trump and Netanyahu have opened a can of worms here. Iran is now looking at what else it can tax, since it's become apparent that the US can't actually win and Iran does in fact have the upper hand.

The most powerful military in the world is of little use if the political will isn't there.

Comment Re:BitLocker isn't the only one, of course (Score 1) 69

If you use BitLocker similarly to how you use VeraCrypt, this vulnerability does not affect you.

The most common mode for Bitlocker is the automatic mode, where the drive is encrypted and Windows loads the key at boot time without any interaction. It's transparent to the user, most people probably don't even know it's enabled. It uses the computer's TPM to store the key, which is only released when Secure Boot confirms that the OS has not been tampered with.

It stops an attacker accessing files by booting Linux or removing the drive, or at least it is supposed to. The idea is that if you don't know the Windows password, you can't log in to access anything, but as this guy discovered you can just go into the recovery environment which doesn't need a user account. The drive is unlocked at boot as normal.

It does seem to be some kind of massive screw up at the very least. Windows 10 made you log in for the recovery environment, but for some reason it changed with 11.

If you set a BitLocker password that needs to be entered at boot, similar to how VeraCrypt works, this bypass doesn't work.

Comment Re:Author seems unclear on music technology. (Score 1) 18

The SNES supported ADPCM, and I don't think it has a wavetable built in. It was up to the game to supply and PCM audio needed. It was definitely one of the better sounding 16 bit consoles though. The PC-Engine with CD-ROM is unmatched, of course, at least for music.

I'm wondering what version of the Doom soundtrack they used. The MIDI files? Some specific sound card's rendition, or all of them? I still have a Roland SC-88, and no 90s sound card ever sounded that good.

Comment Re:No more spyware (Score 1) 45

There was an issue for a couple of days with MG car connectivity in the UK a month or two ago. Simply going to the menu and turning off connectivity fixed it until the servers came back up. So it seams that there at least the connectivity switch does actually work.

Android Auto kept working, of course.

Comment Re:Only takes a few to mess things up (Score 1) 43

Well. I tech mostly IT Security and these students may be different. While I have a class where they hand in homework for the grades, I do result-discussion with all groups and if they have no clue, they fail that one. Has not been an issue so far. For written exams, they can bring as much paper as they like, but no AI.

If what you teach is more about voicing and exploring ideas and not about hard reasoning (in engineering, your solution does not work if not carefully constructed), LLM use would be a massive problem, agreed. LLMs cannot do reasoning at all, but they can find a lot of related things for a query.

Slashdot Top Deals

The number of UNIX installations has grown to 10, with more expected. -- The Unix Programmer's Manual, 2nd Edition, June 1972

Working...