Forgot your password?
typodupeerror

Comment Re:could not be (Score 4, Informative) 141

Basically the EFF exists to defend pedo rights

You are disturbingly confused and thinking of the (GOP) RetardedKlan Party whose head is a literal 34-time convicted felon, pedophile who admitted in a Howard Stern video to invading locker rooms of underage girls at pageants, and all-around Treasonous Shitrag who wears caked orange makeup to hide his syphilis blemishes.

Comment Re:How is this possible? (Score 5, Informative) 67

According to the writeup; there are two methods: it is possible for an extension to mark some parts of itself as 'web accessible'; and linkedin has assembled at least one characteristic file for 6,1000-odd extension IDs and attempts to fetch it to confirm/deny the extension's presence.

The other is based on the fact that the whole point of many extensions is to modify the site in some way; but the site normally has largely unfettered access to inspect itself, so they have theirs set up to walk the entire DOM looking for any references to "chrome-extension://" and snagging the IDs if found.

Not exactly a 'declare installed extensions'; but it looks like, out of some combination of supporting the use cases where an extension and page actively interact by design and either not wanting the possibility or not wanting the complexity of trying to enable 'invisible' edits(presumably some sort of 'shadow' DOM mechanism where as far as the site and everything delivered with it knows only its unedited DOM and resources exist; but the one the user sees is an extension-modified copy of that one, which sounds like it could get messy), inferential attacks are fairly easy and powerful.

Comment What are the odds (Score 1) 66

I just got the encl nastygram from our corporate IT
"We have recently noticed your use of unapproved AI tools, which creates a risk of data leakage. You must not use any AI tools that have not been officially approved when working with business-related information. This includes data such as profits, order quantities, and similar metrics, as well as MS Office files, emails, or any other content containing business information.
We want you to use MS 365 Copilot. ....Microsoft Copilot MS 365 protects our intellectual property."

(I'd asked grok for some lunar orbital data and calculations for fun...so not business-related in any case...)

What are the odds that pointing out in writing to my corporate IT that MS's own terms say "for entertainment purposes only" to say nothing of "We donâ(TM)t own Your Content, but we may use Your Content to operate Copilot and improve it. By using Copilot, you grant us permission to use Your Content, which means we can copy, distribute, transmit, publicly display, publicly perform, edit, translate, and reformat it, and we can give those same rights to others who work on our behalf." is just going to get me more nastygrams and probably on someone's shitlist?

I would guess 100%, and didn't even need Copilot or grok or gemini to figure it out!

Comment Living where? (Score 1, Interesting) 193

Where exactly does supporting 3 people on $133k/year count as 'upper middle class'? You could be doing a lot worse, and many are; but that's not just tons of money in a HCOL area; and that's also lower than twice the median salary for full time employees with bachelor's degrees; so you are calling either a single income household doing a bit better than median or a dual income one doing worse 'upper middle class'; which seems pretty ambitious.

Comment Re:Honey, wake up, new hellscape just dropped (Score 1) 87

Realistically, the status quo has arguably outrun the dystopia there. Your phone already does far more than anything you could get into the power envelope of a bracelet or embedded chip implant, and if for some reason you've raised enough eyebrows that you'd be hauled in for an RFID read DNA is a pretty indelible identifier.

It's not 100% ironclad; but penetration is broad enough that you've basically got the majority carrying highly fingerprintable RF beacons and the minority standing out for their relative radio silence and attempts to deal in cash. Expensive and uncomfortable ankle trackers are good business and feel nice and punitive, just to remind the wrong sort of people we aren't happy with them; but you don't really need to impose a surveillance society when it will build itself for you.

Comment Re:Not a 486 thing, but... (Score 1) 129

My (admittedly anecdotal from the totally unscientific sample of random stuff I've had reason to work on) impression is that some 'shared' BMC ports had oddities related to network controller sideband interface speeds, since NC-SI is what the BMC is depending on if the NIC is on someone else's PCIe root. It's not like the BMC actually needs a faster link for much(normal management traffic probably doesn't fill 10mb and mounting virtual media may be literally once-in-a-lifetime) so the actual speed of the NC-SI interface was not a burning priority; but it left things up to the NIC whether it would support remaining at gigabit speeds and just quietly slipping the trickle of shared traffic in(presumably slightly more complex; but seems to be what the newer ones do) or if it would knock the link rate down visibly to simplify the case.

You see little echoes of similar behavior elsewhere. The intel desktop and laptop NICs that support 'vPRO' will be GB or 2.5GB when the system is on; but quietly drop back to 10 or 10/100 when it is off and it's just the management engine listening. Some enterprise vendor USB docks do similar things; looks like a normal USB NIC when the OS is up; but drops to a lower speed and operates quietly over, I think, some sort of oddball vendor-defined messages if one of their systems is plugged in but off.

Comment Why all at once? (Score 2) 48

I assume that, as an exercise, getting 5 simultaneous introductions working makes for a better paper; but is there a reason why you would want that in practice? Especially if there is any wobble in the ratios either randomly, across generations, or in the presence of certain environmental conditions that tweak the plant's metabolism one way or another that sounds like it would be a real pain in the ass to have to re-balance (and, if different patients are deemed to need different combinations even a perfectly stable plant is going to need re-balancing of the outputs) vs. very specifically going for a specific target output per-plant(or e. coli or yeast or whatever is easiest to bioreactor) and then just mixing to taste after purification. Is there some advantage I'm not seeing?

I realize that there are cases where some plant-sourced pharmacological effect looks like it is actually driven not by the identified 'active ingredient'; but by dozens or hundreds of assorted things, and in that case you just have to live with the complexity if you get better results with that than with purified isolates; but if you are deliberately engineering for very specific outputs why a mix of 5?

Slashdot Top Deals

"If you want to eat hippopatomus, you've got to pay the freight." -- attributed to an IBM guy, about why IBM software uses so much memory

Working...