Comment Re:On the next episode of As the Billionaires Turn (Score 1) 45
If they had better judgement they'd agree to a compromise or split instead of have a pettiness contest in public.
If they had better judgement they'd agree to a compromise or split instead of have a pettiness contest in public.
MS could be far more evil than they are, given their power and market-share. At least Satya is the devil we know.
Lying to the Board and lying to the public are different things.
rivals like AMD and Intel offer competitive specs on paper, but their software stacks have struggled with bugs, compatibility issues, and weak adoption. As a result, Nvidia has built an Apple-like moat around AI computing, leaving the industry dependent on its expensive hardware.
Nvidia's competitors need to work together to improve open-source software tooling and to standardize hardware interfaces, or else go the way of Commodore and Tandy.
Trump is doing all in his power to fight for the little guy including stopping foreign H1B1 Visa holders.
The democrats care about the foreignors. Not us!
Cheapskate co. doesn't want to pay for retraining from one IT specialty to another.
Boeing MCAS, run!
PeopleSkillsGPT failed them
and that takes effort.
> Throttling is ineffective if you base it on IP address...
I didn't dictate any specific throttling algorithm. You are stabbing a strawman.
> an attacker obtaining the encrypted vault is probably not going to be able to decrypt many passwords,
That may not be how they breach them. It's an extra layer or device that may have an inadvertent security flaw. The more turtles in the stack, there more turtles there are to hack.
It will be interesting to see who gets rich after the bubble pops. Biggest Game of Financial Chicken Ever, Believe Me!
"Covfefe"
The random ones are too hard to remember, most will copy and paste. Either that, the help-desk is swamped with resets.
I'm not understanding why the traditional approach doesn't need throttling. Keep in mind a DOS attack is usually considered a smaller "sin" than a breach(es). If you allow too many retries, then the second sin is more likely. I see no third option*, it's either a DOS freeze or lots of retries.
If hackers find a design weakness in your company's preferred/required password-keeper, they can potentially hack them all. A company can allow multiple keeper brands, but then they either have to vet them all, or accept that some users will select a dodgy brand.
> I read your setup as a global throttle. If that's not what you meant...
* The best throttling and/or DOS defense strategy/algorithm is a more involve topic, but so far not a difference maker in what we are comparing.
> so now attackers can easily DoS your login system.
What keeps them for doing that with a traditional system? Even a traditional login screen should be throttled.
> Which is why you store it in a password-keeper
Another vector for hacking.
A meeting is an event at which the minutes are kept and the hours are lost.