

Headline is misleading. The Nokia hardware worked fine; it’s the host vehicle from Intuitive Machines that tipped over and ran out of power.
I’m an electrical engineer living in Los Angeles, CA.
Headline is misleading. The Nokia hardware worked fine; it’s the host vehicle from Intuitive Machines that tipped over and ran out of power.
Startup time. RAM consumption. Privacy.
That’s weird, the computer says everyone was born January 1, 1900.
Now explain PartialEq, and why it’s mandatory.
It works for now on x86-64, yes. For now. As always, we are one “think of the children” crisis away from lobbyists taking that option away.
It’s not for you, it’s for them. Secure boot means it only runs their operating system, not yours. Trusted enclave means it secures their DRM-ware from tampering by the user who owns the PC.
Sure, but there’s still no excuse for “store the password in plaintext lol”. Once you’ve got user access, files at rest are trivial to obtain.
You’re proposing what amounts to a phishing attack, which is more effort, more time, and more risk. Anything that forces the attacker to do more work and have more chances to get noticed is a step in the right direction. Don’t let perfect be the enemy of good.
No, defense in depth is still important.
It’s true that full-disk encryption is useless against remote execution attacks, because the attacker is already inside that boundary. (i.e., As you say, the OS will helpfully decrypt the file for the attacker.)
However, it’s still useful to have finer-grained encryption of specific files. (Preferably in addition to full-disk encryption, which remains useful against other attack vectors.) i.e., Prompt the user for a password when the program starts, decrypt the data, and hold it in RAM that’s only accessible to that running process. This is more secure because the attacker must compromise additional barriers. Remote execution with root is harder than remote execution in general.
Is this why Ian McCollum’s videos are getting altered? Over the years, he’s had many historical deep-dives featuring firearms from the Murphy’s auction house. In recent months, he’s been re-uploading those videos to cover their logo with the word “Morphy’s”. Even though the auctions are long over, I suppose Google counts them as promoting sales.
This isn’t funny, this is just the sad state of software these days.
Phase 1: Fuck around
Phase 2: Find out
Incentives like this are tricky. You can reduce the numbers by fixing the problem, or by sweeping it all under the rug. Guess which is easier to do on a quarterly basis?
No bounds checking, only fast.
STOP! You have violated the law. Pay the court a fine or serve your sentence. Your stolen goods are now forfeit.
Send them an invoice at your expected hourly rate.
entire site is moderated by unpaid, unrecognized “employees”
Don’t you mean “landed gentry”? /s
Fuck Spez.
This site opens a popup asking to share info with 800+ marketing partners. Fuck no.
Simple solution: Don’t connect it to the Internet. Hackers hate this one weird trick.
That’s correct. IM-1 in Feb 2024 and IM-2 in Mar 2025 both ended with tipped-over landers.