wiki-user: car

  • 2 Posts
  • 38 Comments
Joined 2 years ago
cake
Cake day: July 13th, 2023

help-circle

  • Why should the interviewee assume that?

    This could very well be a test to see if the applicant has an idea of how a project scales or how they need to interact with other departments or track down compliance information. It could also test the applicant’s ability to provide a sanity check to a boss’s idea before they pitch something that the team can’t actually do






  • I have an enclosed CoreXY printer. There’s a lot of variety in filament affordability, so I’m working my way through the (cheap) stuff on Amazon, slowly but surely. The 3DF branded ABS used here looks nice but was wound like hot trash. I ordered three rolls and I think I need to return two of them.

    Any particular brands you’ve run that have been consistently good? I’m eventually going to try the good stuff like Polymaker, but I can get two rolls of play material for the price of one nice roll.




  • And even if we could provide the training algorithm a perfectly diverse dataset, who gets to decide what that means? You could probably poll a million anthropologists from across the world and observe trends, but no certain consensus. What if polling anthropologists in underdeveloped nations skews in a different direction than what we consider rich countries? How about if a country was a colonizer in the past or has participated in a violent revolution?

    How do we decide who qualifies as an anthropologist? Is a doctorate required, or is a college degree with numerous publications sufficient?

    I don’t think we’ll ever see a perfectly neutral solution to this problem. At best, we can come equipped with knowledge that these tools may come with some biases, like when you analyze texts from the past. You make the best with what you have and strive to improve


  • This seems simple for one stream, but scale that up to how many unique streams that Youtube is servicing at any given second. 10k?

    Google doesn’t own all of the hardware involved in this video serving process. They push videos to their local CDNs, which then push the videos to the end users. If we’re configuring streams on the fly with advertisements, we need to push the ads to the CDNs pushing out the content. They may already be collocated, but they may not. We need to factor in additional processing which costs time and money.

    I can see this becoming an extremely ugly problem when you’re working with a decentralized service model like Youtube. Nothing is ever easy since they don’t own everything.



  • I share your thoughts. Feels like for better or worse, this generation has exceedingly few true console exclusives. The Xbox ecosystem offers more sales in my corner of the world plus the option for gamepass if you’re so inclined, so it seems like a better value.

    I finally picked up a PS5 on sale for a family holiday gift. I originally wanted to grab one for VR, but the longer I hold off, the more I’m seeing that it’s simply not a competitive package for that gaming space. I don’t have a gaming computer, so I’m limited to a few options, but for what my kids are interested in, a Quest 3 just offers more.

    It’s kind of dumb. I want to spend my money on VR, but I don’t want to waste it. It’s a bit of a catch-22 where the ecosystem needs supporters now to grow, but people like myself don’t want to support it because it hasn’t grown (to meet the competition’s offerings, anyways)




  • It’s best to purchase an old router which doesn’t support new protocols to learn with. It should only be used for your testing - not meant for normal use. WEP will be several orders of magnitude easier to crack than WPA2 or WPA3. Tools can help you break certain implementations of encryption regardless of how many bits of entropy that are being used - often by addressing weaknesses in the algorithms or cryptologic pathways vice brute forcing. That’s often the kind of thing demonstrated in conferences and featured in research papers.

    As far as everything else is concerned, you’ll get there if you stick with it. I’ll echo what others have said in this thread; there are some serious diminishing returns for attaining absolute security, all of which can be bypassed by attacking you.


  • Best place to start is by vacuuming up some open courseware from MIT on the topics you’re interested in. RF fundamentals, basic wireless communications, maybe some basics of network security and fundamentals of computer security or cryptology.

    You need a knowledge base in order to know what to look for when you run into problems, else you just kind of waste a lot of time.

    Then, familiarize yourself with wireshark. Start the program and visit a few http websites to see what information your computer is transmitting and how it’s formatted. Your goal is to ultimately snoop on this information and modify it. You need to know how to change a character in the middle of a packet to deliver an effect. If none of that makes sense…

    Learning an SDR is honestly a bit of a pain. You can get a $30 antenna on Amazon that covers the ~1-6 GHz range and that will enable a lot of what you want to do. Try to pick up on old router that supports the WEP protocol. It’s old and deprecated with lots of information on how to break it.

    Combine the SDR with your computer and wireshark to visit a webpage with HTTP. You’re almost certainly going to run into problems manually isolating and cleaning up the WiFi signal on your SDR into something that’s useful, but you probably have enough to start you off on your journey. If you can capture the WiFi traffic and convert it from an analog waveform into a digital bitstream, then you can finally begin doing useful things. Of course… you need to decrypt the bitstream and account for errors.

    Good luck


  • I came off as pretty aggressive, so I apologize. I’ve been interested in this field for a while and I am still an amateur in most aspects. This isn’t really an area that’s intuitive or easy to pick up for most people.

    You’ve come out of the gate swinging. It’s technically possible for people to do the things you’re exploring… but the same people who are publishing these techniques and concepts are professionals. They may not have formal education in computer science, but they have the experience.

    Spend time going over things like DEFCON presentations. Sharpen your coding skills. Vacuum up free courseware from sources like MIT.

    You can probably pick up “normal” RF with a cheap SDR antenna setup, but then what? You are stuck with some waves and no idea what to do with them. Are you picking up intentional Bluetooth? How would you recognize Bluetooth that’s frequency hopping? Looking at RF waveforms for modern communications is absolutely ugly and tedious.

    There’s so much to learn. You need to pick one topic and dig in. All of these things have much more depth than we can explain over lemmy.


  • You should try this. I guarantee that it’s nowhere near as easy as you’re thinking.

    There’s a huge difference between proof of concept activities and useful, fruitful information gathering and analysis.

    If you’re going to be downloading programs and running scripts without doing the work to understand how these tools were built and how to modify them to suit your use cases, then you aren’t actually going to get anything useful out of them.


  • I don’t think an RTL-SDR is going to help you with any sort of privacy outside of maybe validating that your devices aren’t emitting typical RF while they off. You aren’t realistically going to become an electronic warfare master with some shitty home equipment and no formal training.

    Best route is to start combing through security conference presentations for anything relevant to your lifestyle.

    A lot of the cutting edge information gathering stuff isn’t exactly practical for widespread use. I guess somebody living a floor above you could capture your wireless traffic, but you’re not interesting enough for them to dedicate high sensitivity antennas and bespoke equipment to phreak your keyboard strokes and break out fucking differential power analysis techniques on your home.

    Practice good data and security hygiene, stay off social media when possible, and don’t use IOT devices. If anybody wants to get at you, and I mean really wants to get at you, there’s nothing you’re going to be able to do about it besides giving up all electronics.


  • It would be great if Sony would commit to its own creative endeavors.

    The PSVR suite has some great potential, but outside of like… 3? first party games, it doesn’t have anything that you can’t find elsewhere. And for the titles that are available on other platforms, they tend to be updated more frequently or are otherwise more feature rich elsewhere. There’s a lot of power behind the platform, but almost nothing to use it for.

    PSVR 2 is not compatible with PSVR1 from the PS4, so all of your accessories and games don’t carry over.

    The newly updated Meta Quest 3 can run standalone or linked up to a computer. I don’t expect Sony to ever open up compatibility outside of its ecosystem, but history has shown that Sony is fine with abandoning ideas that don’t immediately print money.