• 0 Posts
  • 66 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle
  • Yeesh, I didn’t even know there were consumer grade WiFi transceivers that were strong enough to cover such a massive area. Was it a small farm or just a big property? That had to have been a pretty expensive WiFi system regardless. Did you use Ubiquiti directional access points or something?

    I have a sister that runs a small family farm and she asked my brothers and me (3 of us have IT backgrounds/careers) for viable coverage solutions to their various livestock areas. We settled on just running copper to one barn from her house and broadcasting from there with a few repeaters equipped with trunk channels in order to maintain full duplex.


  • Ackshually, being too close to high power radio frequencies isn’t safe. I remember at one base I was stationed at in Afghanistan, there was a smoke spot we all used to take breaks at. For some reason, I started developing really bad headaches and feeling kind of nauseous. I figured I was just acclimating to the local climate or something. After a few weeks, I was up on our building installing one of our satcom dishes on top of it when I noticed something. Right on the other side of the fence of that smoke area, was a ~2m high powered dish pointing just above above where the smoke area was. I pointed this out to the Norwegians that ran the camp and the break area was promptly moved, lol.

    But seriously, I do not understand the anti-5G nutters.








  • Well, I’m not a cybersec specialist, but my job requires us to comply with NIST cyber security frameworks, including going through external audits every year. In my opinion, your basic generalities are fine for those not working in that field specifically.

    However, for cyber security analysts and other specialists, I think specific subcategories are necessary. The reason being, IT is an absolutely massive field that contains a ton of specialties. As such, that means there are roughly an equal variety of malicious actors in the same field.

    There’s no such thing really as a general “hacker” anymore. Especially when you take into consideration the rapid expansion of state sponsored cyber attacks/warfare. You’ll have specialists for various types of:

    • phishing (e.g. targeting general pop/employees, or those going for specific people)
    • cryptography (e.g. those who try to compromise an org’s PKI, or people finding vulns to exploit expired certs like what happened with Azure last year)
    • vuln hunters/exploiters (e.g. people that monitor known vulnerabilities and probe orgs’ defenses to see if those vulns are present/unpatched/unmitigated, or even people who try to discover new ones)
    • malware engineers (e.g. fairly self explanatory, but malware is a very broad term and can come in numerous shapes and sizes, like even using infected images on a website to conduct RCE on mobile devices like what happened a year or two ago)

    Sorry, tangent is getting a bit long-winded now. Anyway, tldr; general terms are fine for laymen or non-specialists, but more precise terms are beneficial for experts in that field.





  • What an insane valuation, lol. I wonder how gullible their seeders/initial investors were when they pitched the company initially. Needing to get that much money to settle bills and debts just blows my mind. Shit like this is why I sold my AMD shares at its peak a few months ago and why it’s probably worth considering selling Nvidia now as it’s peaking. The AI boom may peak a bit higher, but I think the frenzy is going to begin waning within the next ~6 months as more and more investors realize the tech is still very limited outside of backend enterprise use (e.g. using LLMs to ingest all your SOPs, regulations, technical documents, etc. and then make it available for employees to query for random work questions).

    But who knows, I’ve been wrong before.


  • I mentioned in another comment this would kill all trust in their product if it was found out that Windows was secretly doing all of that in the background in their enterprise products. There are other options, and as painful as transitioning to another OS would be, Microsoft being able to spy on everyone at any time would be worth the pain. This would absolutely destroy MS’s stock within a year as their dozens of multi-billion dollar contracts with governments and corporations evaporated. There’s no way the data they’re spying on would be worth the hundreds of billions they’d lose in sales.

    …Then again, we’ve seen corporations kill themselves in dumber ways before… I guess we’ll see.



  • The snapshot feature is only going to be available on certain laptops that have the Snapdragon + AI chip. DoD will likely simply just not buy those laptops and ban any org from purchasing them, like they already do for certain hardware that have been found to be especially vulnerable. Additionally, this feature isn’t turned on by default and costs a subscription fee (i.e. Copilot+), so people will have to consciously enable and pay for it. Lastly, in enterprise versions of Windows, I would bet money that it can be disabled via GPO, as it’s not only the DoD that would have serious issues/concerns with this feature.


  • I feel like these will be useless in all but limited circumstances. A modern battlefield in urban centers will be rife with small and large rubble, making these things unreliable in real world practice when you factor its ability to balance navigating obstacles and dealing with recoil. How does it reload? How long does its battery last? What happens when its weapon jams? Additionally, tricking current AI is fairly simple when you have the resources of a modern military.

    Anyway, it’s interesting to experiment with, but I just don’t think the technology is quite there yet. I think it’d probably be more effective to create self-destructing bomber robot dogs than gun toting ones with our current tech.