Look for digital signage if you want one with a lot of input options and a guarantee it will do only what you tell it to do (they are however more expensive than consumer grade models)
Natanael
Any specific tools will require knowledge of the system you're targeting, so I don't expect to see many public ML poisoning tools targeting anything but open source ML libraries, but adversarial sample tools to fool classifiers (including repainting stuff like those face transformation filters) might get more common because it's much much easier to test
1: easy to port E2EE, it's just math
2: browsers and E2EE is hard, you need an extension to implement it securely so the password can't be made accessible directly to the server (you need it to remain secret even from the hosting company) or else you're dealing with MITM risk
3: easy by sharing encryption keys using E2EE messaging protocols on top
4: encrypted search is a thing, but such indexes does tend to have some limitations
5: still easy
6: still easy, Android specifically have APIs to let apps register themselves to the file picker so they can transparently encrypt and decrypt files. But yes on other systems where 3rd party apps can't offer such integration then it's hard
I've seen one called Skiff that's trying to do most of these things
There's probably lots of ways, look up adversarial samples in machine learning and poisoning attacks
https://christophm.github.io/interpretable-ml-book/adversarial.html
https://www.computer.org/csdl/magazine/co/2022/11/09928202/1HJuFNlUxQQ
Email predates WWW, it's fuzzier to determine if email is older than packet routed internet because both standards evolved in parallel so you have to pick and choose what counts on each end. First use of @ or creation of SMTP? First network with 3+ organizations or creation of TCP?
That's not sufficient alone
There's no difference from s copyright perspective
Dual copyright is a thing, if your work is not sufficiently transformative (for example if you retain enough substantial original features that it's clearly recognizable) then it can be infringing if the original even if your changes is under your copyright.
Hierarchical tags is also possible. In fact Gmail has it, so you can for example create a work tag and then subtags for each company you worked at, and do similar things with hobby tags, and apply multiple tags
Not at all, those ones are permanently in pairing mode with no interaction required and instead it should require manual pairing
They have Bluetooth for convenience to help you listen to regular audio sources, but they should definitely have better controls available. Sounds like theirs are permanently in pairing mode
The S in IoT stands for security, and the P stands for privacy.