Bitrot

joined 1 year ago
[–] [email protected] 3 points 2 weeks ago

The bot demonstrated very well what this article is about. I don’t know the internals, but I also can’t image the bot was using the best and most expensive ways of doing analysis.

It was pretty bad at “getting the point” even when it was obvious, a better system should be able to do so. Sometimes the point is more difficult to discern and there has to be some judgement, you can see this in comments sometimes where people discuss what “the point” was and not just the data. I imagine an AI would have some difficulty determining what is worth summarizing in these situations especially.

[–] [email protected] 6 points 2 weeks ago

Different applications have better performance on one vs other. Google Cloud still offers a lot of Nvidia options.

[–] [email protected] 0 points 4 weeks ago (1 children)

Normal based on what? The ads exist because plenty of normal people use them to decide where to buy things or certain items. If they didn’t bring people in the stores wouldn’t bother.

[–] [email protected] 1 points 1 month ago (3 children)

Do you regularly use their ads to compare prices and select what to buy at each one, or generally stick to one place with a few trips to another one?

[–] [email protected] 10 points 1 month ago (5 children)

I think you explained it fine, it just doesn’t make sense to people who only go to the same place.

[–] [email protected] 5 points 1 month ago

Difficult to fix if exploited.

Can be patched beforehand.

[–] [email protected] 6 points 1 month ago

It’s not just the title that is poorly written. The entire thing is written like “the sky is falling because memory chips and big computer stuff has a broken”.

[–] [email protected] 1 points 1 month ago

According to them, “The threat intel data noted in this report is available to tens of thousands of customers, partners and prospects – and hundreds of thousands of users.”

It seems like they are trying to say their network is fine.

[–] [email protected] 2 points 1 month ago (1 children)

How dare they not commission a piece.

[–] [email protected] 3 points 2 months ago* (last edited 2 months ago) (1 children)

They are watching DHCP Discover option 55. The device tells the server what options it expects to receive, and different vendors and device ask for different options or ask for them in a different order, and they are fingerprinting that.

Cisco also describes the tactic: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/116235-configure-ise-00.html

The fingerprints are viewable at https://github.com/karottc/fingerbank/blob/master/dhcp_fingerprints.conf - it is more specific than a mac vendor but not extremely anti-privacy, anybody watching firewall logs will know an iPhone connected pretty easily too.

[–] [email protected] 2 points 2 months ago

You need to say more than that about what your concern is, especially on devices configured for Mac randomization and other privacy features.

Aruba is looking at the dhcp traffic and inferring information about the device. The device is not sending all of this data.

[–] [email protected] 4 points 2 months ago* (last edited 2 months ago) (1 children)

That’s also empty weight on the Learjet, gross weight is higher. This one is presumably that weight with the batteries so I suspect is smaller. Wish there were more details.

view more: next ›