Their hacking teams will still be connected.
Their hacking teams will still be connected.
That was true a while back, but yes drives have gotten way better.
That’s just failure rate though, not data loss. You need your drives using a sane file system like zfs or using raid 1/10/6 where discs can do error checking as well to prevent silent data loss.
They also need to be powered on. Offline drives will lose data to bit rot over time.
Why not
More expensive
This Anker does all of the above. Its switching speed is 10ms, so it fits the UPS niche as well.
Meanwhile, I’ve had nothing but trouble with consumer APC and find Cyberpower’s bullet proof. Had one that went 10yrs before any issues, and a second with 3+ and counting, no problem.
An alternative to both is the burgeoning battery banks for camping/emergency power. Most of these offer UPS quality switching times, so they can act as a UPS when not in use for an emergency. Ecoflow/ anker solix/etc. A big advantage of these is the battery chemistry is very long lived and much better than UPS lead acid. Dont expect a pure sinewave, but you weren’t going to get that from most consumer UPS anyway.
They didnt buy ARM. They tried to, but the buy out failed. Biden’s FTC shut that merger down.
As a heads up, your readme has “machine” misspelled as “maschine” in two spots:
On your current maschine
On another maschine
Looks like thats the german spelling?
Made lots and lots and lots of money selling their stake.
So yes.
You think a nearly trillion dollar public company has an internal division that writes malware against flaws in its own software in order to harvest data from its own apps. It does this to gain just a bit more data about people it already has a lot of data on, because why not purposely leave active zero days in your own software, right?
That is wildly conspiratorial thinking, and honestly plain FUD. It undermines serious, actual privacy issues the company has when you make up wild cabals that are running double secret malware attacks against themselves inside Google.
Anduril is Palmers Luckey “smart” missle/border tower company. Palmers Luckey, the alt right billionaire that sold Oculus to Facebook, whose sister is married to child rapist and former attorney general nominee Matt Gaetz. He has deep ties to alt right billionaire Peter theil, the facebook/paypal billionare, that owns the data harvesting/ai company Palentir that Israel uses to target “enemy combatants”.
Theil is an outspoken monarcist who literally believes in an american king and that women should not be allowed to vote. He was the primary donor to Vance senate campaign, and a large reason he was the VP pick.
Yes, deeply fucked.
Agreed. That still doesnt mean google is not doing E2EE for its RCS service.
Im not arguing Google is trustworthy or better than Signal. I’m arguing that E2EE has a specific meaning that most people in this thread do not appear to understand.
So your stance is that Google is applying self designed malware to its own services to violate its own policies to harvest data that could bring intense legal, financial and reputational harm to it as an org it was ever discovered?
Seems far fetched.
You have the key, not the provider. They are explicit about this in the implementation.
They can only read the messages before encryption if they are backdooring all android phones in an act of global sabotage. Pretty high consequences for soke low stakes data.
E2EE means a 3rd party cant extract anything in the messages at all, by definition.
If they are doing the above, it’s not E2EE, and they are liable for massive legal damages.
Thats below market for a 40hr week in San Francisco for a software dev. From levels.fyi, which allows people to confirm their employment anonymously:
The average Software Engineer salary range in San Francisco Bay Area, CA is from $195,000 to $350,000. Last updated: 12/3/2024
Town is wildly overpriced, and hes paying about 1/4th what he should be for 84 hrs/week.
Thank you. I had trouble running down a list.
I do consider Signal to be a more trustworthy org than Google clearly, but find this quibbling about them “maybe putting a super secret backdoor in the e2ee they use to compete with iMessage” to be pretty clear FUD.
Not that I can find. Can you post Signals most recent independent audit?
Many of these orgs don’t post public audits like this. Its not common, even for the open source players like Signal.
What we do have is a megacorp stating its technical implementation extremely explicitly for a well defined security protocol, for a service meant to directly compete with iMessage. If they are violating that, it opens them up to huge legal liability and reputational harm. Neither of these is worth data mining this specific service.
That’s a different threat model that verges on “most astonishing corporate espinoage in human history and greatest threat to corporate personhood” possible for Google. It would require thousands if not tens of thousands of Google employees coordinating in utter secrecy to commit an unheard of crime that would be punishable by death in many circumstances.
If they have backdoored all android phones and are actively exploting them in nefarious ways not explained in their various TOS, then they are exposing themselves to ungodly amounts of legal and regulatory risks.
I expect no board of directors wants a trillion dollars of company worth to evaporate overnight, and would likely not be okay backdooring literally billions of phones from just a fiduciary standpoint.
Its a specific, technical phrase that means one thing only, and yes, googles RCS meets that standard:
https://support.google.com/messages/answer/10262381?hl=en
How end-to-end encryption works
When you use the Google Messages app to send end-to-end encrypted messages, all chats, including their text and any files or media, are encrypted as the data travels between devices. Encryption converts data into scrambled text. The unreadable text can only be decoded with a secret key.
The secret key is a number that’s:
Created on your device and the device you message. It exists only on these two devices.
Not shared with Google, anyone else, or other devices.
Generated again for each message.
Deleted from the sender’s device when the encrypted message is created, and deleted from the receiver’s device when the message is decrypted.
Neither Google or other third parties can read end-to-end encrypted messages because they don’t have the key.
They have more technical information here if you want to deep dive about the literal implementation.
You shouldn’t trust any corporation, but needless FUD detracts from their actual issues.
I wouldn’t believe the cops without some evidence either way.