

Sounds quite similar to Markov chains which made me think of this story:
https://thedailywtf.com/articles/the-automated-curse-generator
Still gets a snort out of me every time Markov chains are mentioned.
Sounds quite similar to Markov chains which made me think of this story:
https://thedailywtf.com/articles/the-automated-curse-generator
Still gets a snort out of me every time Markov chains are mentioned.
Depending on your level of caffeine tolerance/dependency actual coffee might be even better.
Alternatively: Decaf.
Oh, they’re putting a lot of thought into it I’m sure.
That thought being “Money, Money, Money, Profit, Profit” of course.
Ah, you “work” in “marketing”?
They occupy a strange niche full of contradictions.
Entering the code on the device itself should increase security as opposed to entering it on a compromised computer.
But plugging it into a compromised computer means the data is compromised anyway.
Their security is way harder to audit than a software solution like PGP. The actual “encryption” varies from actual decent setups to “entering the code connects the data pins with no actual encryption on the storage chip”
Not having to instal/use software to use them means they are suitable for non-technical users which in turn means more support calls for “I forgot the pin, it wiped itself, can you restore my data”
They are kind of useful to check the “data is transported on encrypted media” box for compliance reasons without having to manage something bigger.
It doesn’t. It carries you by having a module for absolutely everything even shooting yourself in the foot.
B stands for Billion (Parameters) IIRC
Okay, you got me there. In all fairness, as instruction videos go, that one is on the tame side.
Thanks for posting the instructions here.
Tl;dw:
Append systemd.debug_shell to the boot command line.
No, No, they don’t understand everything and nothing!
I’m hopeful that reencoding on the fly or even merging preencoded files into a single stream is too expensive because it needs a lot of compute power and invalidates caches .
I built a custom app to do it since I couldn’t manage to fire the relevant intents from an adb shell without root.
I lifted the code from AAAD
Specifically the InstallAPK method in MainActivity.java
Intent intent;
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.N) {
intent = new Intent(Intent.ACTION_INSTALL_PACKAGE);
intent.setData(getUri(file));
intent.setFlags(Intent.FLAG_GRANT_READ_URI_PERMISSION | Intent.FLAG_ACTIVITY_NEW_TASK);
} else {
intent = new Intent(Intent.ACTION_VIEW);
intent.setDataAndTypeAndNormalize(Uri.fromFile(file), "application/vnd.android.package-archive");
intent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK);
}
intent.putExtra(Intent.EXTRA_NOT_UNKNOWN_SOURCE, true);
intent.putExtra(Intent.EXTRA_INSTALLER_PACKAGE_NAME, "com.android.vending");
getApplicationContext().startActivity(intent);
}
Basically you construct an Intent ACTION_INSTALL_PACKAGE
with data pointing to the APK file and the extras EXTRA_NOT_UNKNOWN_SOURCE=true
and EXTRA_INSTALLER_PACKAGE_NAME="com.android.vending"
which tells the installer that this APK is not sideloaded and it’s the play store asking to install it.
You might still need to enable unknown sources in Android Auto developer settings (separate from phone developer settings).
If I remember, I’ll try to pull the code for my app from my PC and post it.
The problem is that android auto is restricted to apps installed from the play store.
The F-Droid Version supports Android Auto, but it’s blocked by Google.
I managed to enable it by spoofing the installer-package during installation.
For me, the navigation is near unusable. Location tends to lag behind by a few seconds when running on Android Auto. On my phone it’s fine.
IT changes usually affect management as well, while “cost saving” in production doesn’t.
Stopping AWS instances would be handy, but your idea to slag the drives is unnecessary.
Just set up full disk encryption for everything.
You die -> no key -> no data
I run a 2 node k3s cluster. There are a few small advantages over docker swarm, built-in network policies to lock down my VPN/Torrent pod being the main one.
Other than that writing kubernetes yaml files is a lot more verbose than docker-compose. Helm does make it bearable, though.
Due to real-life my migration to the cluster is real slow, but the goal is to move all my services over.
It’s not “better” than compose but I like it and it’s nice to have worked with it.
They should not be worried, they should be educated.
If you worry a new user enough they’ll go back to Windows or Apple because there’s less scary warnings there.
We need to make the transition as pain free as possible. Learning about the joys of kernel compilation and SELinux can come later.
The first step is "Hey, this is as usable as Windows, without stupid ads in the start menu.