

deleted by creator
deleted by creator
A note, not all states operate this way, but the concept of ‘right of way’ is going away. Judges do not like the idea of someone feeling privileged enough to make a situation worse. In general, they want to implement fail-safes and not fail-unsafe situations.
Edit: To add - we’ve actually had this for a while, it’s called ‘failure to yield’. The switch is actually being more driven by emergency services making things worse, which is kind of relieving given the general sentiment. Unfortunately it’s just another phrase for the same thing, semantics…but if you do go to court, you’re better off presenting who failed vs who’s entitled.
Might only be the whistleblowing stuff. Might not. Guess you’ll have to kill me to find out.
Try using a tab suspend extension, something like ‘auto tab discard’. Firefox has one built-in, but it’s not aggressive enough.
“HAL! I need you to understand, Twitter is X now! Please, unlock the damn door!”
You might be interested to know that there are several hardcore modding scenes, where the point is to mod the game for fun. The mod guides are updated every month or so and includes thousands of mods. It takes days to install, and actually playing is optional. In most cases, a new save is required every update, so modders keep an additional playable state if they actually want to play the game.
Lexy’s LOTD is my fav one, it’s only over a thousand mods, has very detailed instructions, and a very friendly community.
Similar. Two cases. First was taking charge of the entire Bases secure network upgrade because I was the only one who knew how the new devices worked. I ended up having to attend a meeting with a General and his staff and had to be chaperoned by an E5 because I was only an E3 at the time.
The second was my entire time working in White House Comms. Can’t talk much about it but I’m sure you can imagine how out of place it would feel.
Keep in mind that part of the reason I think they’ve given up is because there’s no reason to believe the promises made will ever be delivered. They may care about taxes, but you’d probably get more engagement by making an AI generated tiktok video of a dinner table splayed with food in the image of rich oligarchs. There just isn’t much left but the jokes, it’s not code - it’s that if everything is going to be bullshit, it might as well be entertaining.
Everything has to be a meme. Lower taxes, healthcare, or racism isn’t exciting. Couches, weird, eating pets and out of context outbursts get way more engagement. Mostly, because people have given up.
I was sitting at the doctor’s office and overheard an old man claim Harris was so stupid that she couldn’t figure out how to use a vacuum.
It broke MY brain trying to wrap my head around that one.
There’s also no such thing as “Military Grade” Encryption. The government as a whole, as directed by NSA, uses the same encryption technology. If anything, one of the defining techniques is how said technology is implemented as a process. That means less about the algorithm and more about the hardware and handling. For example, when dealing with classified networking, one of the key differences is using dedicated hardware. These aren’t PC’s that can be hacked, they are devices whose specific role is to handle encryption, key loading, or key acquisition. They are hardened to prevent emissions from leaking and will dump keys, firmware, memory if tampered with. End devices can only accept keys with no way to retrieve them for reuse.
Advertisers that claim they are offering you “Military Grade” encryption just do regular NSA encryption methods in software, with no hardware component, and no handling process. Which would never be used in the military to secure classified data.
Also, most encryption used in these devices don’t use one key, they use key generators. Each device talking to another generates a unique, temporary session key. These session keys do not last long, so if any one key is compromised it limits any potential unauthorized disclosures. Capturing encrypted data for later cracking would prove to be a time and resource exhausted process that would provide too little information, too late. At this point it would be easier to actually try to steal the keys and hardware, rather than crack them.
I feel like starfield is an experiment in user driven content (mods) to sell a game. The issue with Skyrim is that there is really only one map, and before any map extension mod came out, there were so many mods out there that competed for space on the map. Even today, large world overhaul mods are constantly stepping on the toes of other mods. City redesigns are also a problem unless you’re really good at load orders and merging.
Starfield feels like each world is an open map, ready for people to start designing content: either a colony, a cave, or anything really. The story seems loose and open ended so that it won’t interfere with large collaborative content. It’s not a game they are selling, but a modding storefront. It’s like Skyrim Creations, but putting the horse (armor sold separately) before the cart.
In it’s early days? My nephew played that a long time ago. It filled his PC. I thought it was mods. As in, the entire game would clone itself when it created a mod profile. I don’t think it does that anymore.
Pagers are not guaranteed to be 1 way comms and bringing them into secure locations is a security violation. Additionally, depending on the classification, no unauthorized and undisclosed devices of any kind would be permitted, including any electronics or electronic media such as tapes, CDs, discs, etc. Even when I was issued a verified 1-way pager, I was specifically briefed I was not permitted to bring it into a classified location. Most of the highly classified SCIFS are shielded anyways, you can’t use it inside so it’s safer to leave it out, along with all other devices.
If your organization allows it, then (if federal) they are breaking the law and should be reported/up-channeled. If it’s corpo, you should bring up additional concerns with your security team.
Edit: Also, it goes without saying, current events are probably a good reason why pagers (and other devices) aren’t allowed in classified areas. While most focus on disclosure (getting out), we must not forget the risk of data/operations getting destroyed.
A better example is to explain the chaos of having to go to the grocery store and pick up some hot dogs and buns. You know the pain.
Close, but you are still trusting the device you own. If I were to compromise that device, I could capture that key and use it. Again, this is my limited understanding, but a zero trust solution works in such a way that the actual keys are not stored anywhere. During setup, new temporary keys are generated. A keypass binds to the temporary key for use of authentication. The temporary key can be revoked at any time for any reason, whether it’s due to a breach or routine policies. It can be as aggressive as it needs, and the implication is that if someone else (either you or an attacker) got issued a new temporary key then the other would not receive it. Using an incorrect temporary key would force an initialization again, using the actual keys that aren’t stored anywhere.
The initialization process should be done in a high trust environment, ideally in person with many forms of vetting. But obviously this doesn’t take place online, so there is the risk that your device is not trusted. This is why the process falls back on other established processes, like 2FA, biometrics, or using another trusted device. How this is done is up to the organization and not too important.
But don’t get too hooked on the nuances of passwords, keys, passkeys,etc. The entire purpose is to limit trust, so that if any part of the process is compromised, there is nothing of value to share.
Disclosure: Worked in military and this seems to be a consumer implementation of public/private key systems using vector set algorithms that generate session keys, but without the specialized hardware. It’s obviously different, but has a lot of parallels, the idea in this case is that the hardware binds to the private/public keys and generates temporary session keys to each unique device it communicates with, and all devices can talk with members of it’s own vector set. Capturing a session key is useless as it’s constantly being updated, and the actual keys are stored on a loading device (which is subsequently destroyed afterwards, ensuring the actual key doesn’t exist anywhere and is non recoverable, but that’s another thing altogether). My understanding of passkey systems is solely based on this observation, and I have not actually implemented such a solution myself.
From my understanding it’s the concept of trust. Basic passwords are complete trust that both ends are who they say they are, on a device that is trusted, and passing the password over the wire is sufficient and nobody else tries to violate that trust. Different types of techniques over time have been designed to reduce that level of trust and at a fundamental level, passkeys are zero trust. This means you don’t even trust your own device (except during the initial setup) and the passkey you use can only be used on that particular device, by a particular user, with a particular provider, for a particular service, on their particular hardware…etc. If at any point trust is broken, authentication fails.
Remember, this is ELI5, the whole thing is more complex. It’s all about trust. HOW this is done and what to do when it fails is way beyond EIL5. Again, this is from my own understanding, and the analogy of hardware passwords isn’t too far off.
It’s good that you were able to quote the regulations. You’re not wrong, I’m just apathetic; the question was more rhetorical. To be clear: I don’t have faith that this is strong enough to deter and/or that governing policies have enough teeth to enforce. I’d like to be wrong, but I’m not hopeful.
Or what? A slap on the wrist?
Pretty much, the only caveat I’d add is the assumption of ‘right of way’. You can have situations where road conditions were unusual but drivers are not certain to all the conditions. The involved parties can all assume they have the ‘right of way’, when in reality the best option would have been for everyone to yield until conditions ARE certain.
I’ll give a personal example: I once came upon an accident on a bridge, and the cop cars were already on the scene. It was night, raining hard and the cop cars were facing the oncoming lane with headlights set to high. I couldn’t see anything past the cop cars, so I slowed down from 50 to 25. As I passed, I briefly saw a shadow of a person and heard them say “SLOW DOWN”. I still have no idea how close I was to hitting them, but they must have been very close to hear them thru the rain and sirens. I should have gone much, much slower, maybe even stopped. Fortunately, nothing bad happened, but I had assumed that since the one lane was open that it was ok to use. I don’t know why the cop cars oriented themselves in a way to blind oncoming drivers, but had something happened, the fault would have ultimately been mine regardless.
Another example is parking lots, so many accidents occur at busy locations. People forget how you are not supposed to block ingress (to prevent traffic backing up into the street and making things worse) and get road rage because they can’t leave. I’ve seen people try to “squeeze in” and end up blocking an entire lot because they can’t move. One side will say “zipper” (ie: “my turn for RoW”) the other will say “right of way”, and parking lots are notorious for not having any signs.
Edit: and ofc, old ladies who think blinkers give them RoW
Edit2: an example for cops: blowing thru red lights without making sure intersections are clear. To be fair, everyone should yield to a cop car in the performance of their duties, but this doesn’t mean cop cars get a free pass for RoW and can plow thru full speed, damn the consequences. They still have to take safety of others in mind and yield if required.
Edit3: because I’ve had the discussion before. Yes, it’s semantics. RoW and FTY are the same thing. I’m only saying the phrase is being sunsetted, no Judge wants to hear someone say RoW. Some laws even use them together as “Failure to Yield Right of Way”. The goal is to prevent the mindset of entitlement, to make sure the clarity of safeguards remain in place.