Or they've proven that you can use vein patterns in human skin to positively identify individuals well enough that payment losses are an acceptable risk, and now they plan to just integrate that into their surveillance apparatus everywhere.
Then you've probably never worked in any serious networked embedded systems space. Getting people to open ports on the firewall and making the firewall configuration palatable to the end customer is like a quarter of what I think about when my team makes new features.
Linux probably became first-class for them because a lot of ML workflows rely on NVidia in the cloud, and I don't think anyone really uses Windows for that.
It's more likely network calls that are taking a long time or timing out. A lot of developers insert function calls that under the hood hit HTTP servers, and it can take a few hundred milliseconds to stand up a new TLS connection and then however long it takes to send the request and get the response. It's also probable that the endpoints form an accidental microservice architecture in which case everyone is always hitting a different set of connections. This creates a perfect storm of having to reconnect to everything you hit occasionally which can create little slowdowns all over the place all without actually using CPU so it doesn't show up in any resource monitors.
HTTPS calls should be treated as calls to sleep() with undefined timings.
The whole point of it seems to be to dismiss the entire economic system in favor of something that almost nobody has bought in to like bullion or cryptocurrency or somesuch for the benefit of the speaker. Currency, even paper currency, is one of the most pervasive societal "grand illusions" that we share. But that isn't necessarily a bad thing as it greases the entire system of exchange for literally everyone everywhere.
> The first caliper with a secondary scale, which contributed extra precision, was invented in 1631 by the French mathematician Pierre Vernier (1580–1637).[1] Its use was described in detail in English in Navigatio Britannica (1750) by mathematician and historian John Barrow.[2] While calipers are the most typical use of vernier scales today, they were originally developed for angle-measuring instruments such as astronomical quadrants.
So it would have been a contemporaneous technique with that initial angle measurement, and the use of a Vernier scale for angular measurements would have itself been common.
I've known someone like that too, and in her case it's because she never had anything when she was a kid. So she can take agonizingly long to let go of anything even if it's obviously ruined or worthless because it might be useful in some undefined way in the future.
Yeah I came here to post this. This is the other thing we're going to see. And it doesn't have to be perfect to orchestrate people, it just has to be mediocre or better and it will be better than 50% of humans.
Correct me if I'm wrong, but isn't forcing you to divulge your encryption password compelled speech? So the police can crack my phone but they can't force me to tell them my PIN.
Yes, you cannot be compelled to testify against yourself, but Microsoft is under no such obligation when served a warrant because of third party doctrine. Microsoft holding bitlocker recovery keys is considered you voluntarily giving the information to a third party, so the warrant isn't compelling you to do anything, so not a rights violation.
But, the 5th amendment is also why its important to not rely on biometrics. Generally (there are some gray areas) in the US you cannot be compelled to give up your password, but biometrics are viewed as physical evidence and not protected by the 5th.
Warrants are a mechanism by which speech is legally compelled.
The 5th Amendment gives you the right to refuse speech that might implicate you in a crime. It doesn’t protect Microsoft from being compelled to provide information that may implicate one of its customers in a crime.
Indeed. Third Party Doctrine has undermined 4th/5th Amendment protections due to the hair brained power grab that was "if you share info with a third party as art of the only way of doing business, you waive 4th Amendment protections. I ironically, Boomers basically knee-capped Constitutional protections for the very data most critically in need of protection in a network state.
Only fix is apparently waiting until enough for to cram through an Amendment/set a precedent to fix it.
Well, SCOTUS has ummed and erred over several cases about whether to extend the 4th Amend to third party data in some scenarios. IIRC there is an online email case working up through 9th Cir right now?
One of the reasons giving for (usually) now requiring a warrant to open your phone they grab from you is because of the amount of third-party data you can access through it, although IIRC they framed is a regular 4th Amend issue by saying if you had a security camera inside your house the police would be bypassing the warrant requirement by seeing directly into your abode.
They can't force you to tell them your PIN in some countries, but they can try all PINs, and they can search your desk drawer to find the post-it where you wrote your PIN.
Good PINs are ones you're not allowed to brute force. You can easily configure an iPhone to wipe itself after too many wrong guesses. There's a single checkbox labeled "Erase Data", saying "Erase all data on this iPhone after 10 failed passcode attempts."
reply