Neither has its own extension repository, so maintaining support enables side loading but isn’t all that useful for normal people or those who want their extensions to be up to date.
Brave shields work better than the built-in protection in Vivaldi, so it’s less of an issue there but still frustrating.
Poorly written article with little substance but a zinger of a headline. Think they’re trying to take advantage of announcements of Intel and TPM security flaws in the past to get more clicks.
This is a UEFI firmware issue that can be patched by BIOS vendors. It is an issue at a very low level, but not an issue with Intel or the TPM.
The exploit is in the UEFI firmware code for handling the TPM and used for privilege escalation in that firmware, “TPM won’t save you” doesn’t really make sense because no shit. The vulnerability doesn’t mean the TPM unseals its contents though, and I’m curious if the exploit modifies the PCR values enough that OS security could trigger (Bitlocker recovery and whatever). Wouldn’t help if the malicious software was already there though.
In that case it does sound better, and many sites using passkeys still have you enter your username first anyway, at least at this point. I don’t know how Android implements it, I think iOS likely supports this use case and know that it also works as a second factor to a password through the same Passkey workflow. Unlike the Yubikey it always stores the key when you register though, even if it isn’t fully passwordless. Unfortunately what’s easy for the consumer will dominate.
Passkeys are FIDO2. The issue is the tokens don’t have much storage for them. For passwordless vs use as a second factor, it has to store it instead of dynamically generating a response to a challenge. They are two features of the protocol.
Bing uses ChatGPT.
Despite using search results, it also hallucinates, like when it told me last week that IKEA had built a model of aircraft during World War 2 (uncited).
I was trying to remember the name of a well known consumer goods company that had made an aircraft and also had an aerospace division. The answer is Ball, the jar and soda can company.
Yeah Canonical has never put ads in Ubuntu.
That’s crazy. Not a Microsoft fanboy, but I’ve had issues like that after an actual board swap and they still have made it right (and technically they were in the right to disallow it), and they’ve fixed issues with transferring around my retail license that I’ve had since like Windows 7 because by now it’s been activated a bunch of times. Enshittification.
Because it doesn’t sound like “forge” in English. People hear it and don’t know how it’s spelled (thanks Esperanto).
They did update the Declarative Net Request API to be more useful apparently.
https://www.theverge.com/2023/11/16/23964509/google-manifest-v3-rollout-ad-blockers
The removal came after users widely shared a blog from Texts.com showing that messages sent with Sunbird’s system aren’t actually end-to-end encrypted — and that it’s not hard to compromise it.
End to end encryption means my device encrypts it and yours decrypts it. Their bridge will never be able to support this, it has to decrypt it in the middle to transfer to and from the other service. At the very best, when their implementation isn’t slipshod, you have to trust them when they say they ignore all the (hopefully temporary) plain text data that is passing through their bridge.
The bot demonstrated very well what this article is about. I don’t know the internals, but I also can’t image the bot was using the best and most expensive ways of doing analysis.
It was pretty bad at “getting the point” even when it was obvious, a better system should be able to do so. Sometimes the point is more difficult to discern and there has to be some judgement, you can see this in comments sometimes where people discuss what “the point” was and not just the data. I imagine an AI would have some difficulty determining what is worth summarizing in these situations especially.