- ArchOversight parentThat's why Matter and Thread are IPv6. You don't need IPv4 at all... and if you run out of IPv6 address space, I'd love to see just how many devices/sensors you have in your home.
- Which sellers? I have been looking for custom ones because I have some weird window sizes.
- FedEx in my case paid the bill to customs, shipped me my item, and then secondary sent me a bill to pay for the customs fees after I had already received the item.
They don't want shipments stuck in port because storage there is expensive.
- That assumes the server has a lot of additional CPU power to serve the content as HTML (and thus do the templating server side), whereas with XSLT I can serve XML and the XSLT and the client side can render the page according to the XSLT.
The XSLT can also be served once, and then cached for a very long time period, and the XML can be very small.
- If this is the reason to remove and or not add something to the web, then we should take a good hard look at things like WebSerial/WebBluetooth/WebGPU/Canvas/WebMIDI and other stuff that has been added that is used by a very small percentage of people yet all could contain various security bugs...
If the goal is to reduce security bugs, then we should stop introducing niche features that only make sense when you are trying to have the browser replace the whole OS.
- Sounds like libxslt needs more than just a small number of fixes, and it sounds like Google could be paying someone, like you, to help provide the necessary guidance and feedback to increase the usability and capabilities of the library and evolve it for the better.
Instead Google and others just use it, and expect that any issues that come up to be immediately fixed by the one or two open source maintainers that happen to work on it in their spare time. The power imbalance must not be lost on you here...
If you wanted to dive into what [3] does, you could do so, you could then document it, or refactor it so that it is more obvious, or remove the compile time flag entirely. There is institutional knowledge everywhere...
- Even if you provide a phone number, it will never send the required code or information and you will still be locked out of your account.
That is how I am locked out of a gmail account... eventhough I have the right username/password, and backup email, and typed in a phone number, Google won't let me back in.
- The code would have failed because you can't use an uninitialized variable, so you would have had to set it to a default. You don't just get random garbage from the stack.
- On MacOS it has a larger net mask, but the OS doesn't respond to any address within that range automatically.
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384 options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP> inet 127.0.0.1 netmask 0xff000000 inet6 ::1 prefixlen 128 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 nd6 options=201<PERFORMNUD,DAD> - You believe that Hector Martin is also Asahi Lina?
- Is there going to be a way to turn FIPS on as a requirement without having compiled the binary against the FIPS-140 module?
Even now it has been a lot of trouble trying to get vendors to provide us a way to rebuild/repackage their Golang binaries using the FIPS-140 support from RHEL, and if it is still the case that they need to build one-offs, teams will still need to rebuild/repackage a lot of Golang tools just to be FIPS compliant because it's not as simple as setting a flag like it is for OpenSSL.
- Most projects that compile against OpenSSL can be forced into FIPS mode by setting a flag that the OpenSSL library uses to force enable FIPS mode when it is loaded.
Golang projects however don't compile against OpenSSL instead using the internal cryptography. In many cases rebuilding and repackaging a Golang based tool is a no-no since now you are accepting ownership of it in an audit, when instead you want to point to an upstream vendor, or source code is not available.
So in many cases in production while the system itself is in FIPS mode (Linux kernel), and applications using system crypto libraries (OpenSSL primarily) are in FIPS mode, Go binaries are not in FIPS mode and may end up using algorithms that are explicitly disallowed by the FIPS standards.
- Either projects start shipping FIPS enabled or companies have to rebuild and repackage projects with FIPS enabled.
With OpenSSL installed system wide you can turn on a flag and the library will force it into FIPS mode internally, with Go unless you build your binaries to link against OpenSSL like this Microsoft Go release seems to be doing you don't get that instant on system wide.
- Op uses they/them pronouns.
- Author uses they/them pronouns.
- Op uses they/them pronouns.
- OP uses they/them pronouns.
- I use .network for my internal network with a proper FQDN. This allows me to get certs for internal services that validate in all browsers.
- Ask for your corporation to give you a corporate phone.
I have one for that reason, and it lives in the office alongside my work issued laptop.
- > RAM upgrades across the whole lineup. This particularly benefits the $1,599 M4 MacBook Air, which jumps from 8GB to 16GB
The MacBook Air is still an M3 only as the highest end M-processor.
- This is related to the distribution of CPython itself, the key verification for those artifacts does work and has worked forever. The packaging referred to by the article is about packaging Python itself by upstream distributions.
Python packages developed by third party developers and uploaded to PyPi are indeed not verifiable due to the key issues you mentioned, and is a minor note in the article.
- The Morning Show, Severance, Silo, Tehran, Presumed Innocent, Ted Lasso, Slow Horses, Disclaimer, Shrinking, Loot, Severance, Where's Wanda?, Foundation, Cowboy Cartel (short documentary), Midnight Family, The Last Thing He Told Me, Invasion, Mythic Quest, Bad Monkey, Dickinson...
There's so many good shows on Apple TV.
- It's not only the UK that considers cryptography to be a munition. It is also classified as munitions in the US:
> Encryption items specifically designed, developed, configured, adapted or modified for military applications (including command, control and intelligence applications) are controlled by the Department of State on the United States Munitions List.
It was part of the whole crypto wars, and the lawsuit brought by Bernstein vs the United States.
See more:
- https://en.wikipedia.org/wiki/Bernstein_v._United_States - https://en.wikipedia.org/wiki/Crypto_Wars - https://en.wikipedia.org/wiki/Export_of_cryptography_from_th...
- Docker on Mac is running a VM in a hypervisor to run Linux.
- It doesn't implement some x86 in hardware, it implements some memory ordering guarantees in hardware to match what x86 requires.
However that is a very minor implementation, there is no actual x86 in Apple's ARM.
https://www.sciencedirect.com/science/article/pii/S138376212...
TSO could be implemented by other ARM processors easily as well, to provide the same memory ordering guarantees. Besides that the x86 code is translated by Rosetta to ARM instructions.
- I have used WordPress in the past for various projects, and have upgraded it for customers far more than I would like to recount, but all of this is making me not want to use WordPress for anything moving forward.
This does not feel like a stable foundation/platform to build a future on.
- That is why I continue to use hunter2 as my password.
- There's the `setproctitle` in FreeBSD that is designed exactly for a process to update the information that is presented to tools such as ps.
https://man.freebsd.org/cgi/man.cgi?query=setproctitle&aprop...
- By that same token the general public is also not using IPv4. The general public doesn't care, so long as TikTok and Facebook appear on their mobile devices.