• 2 Posts
  • 45 Comments
Joined 1 year ago
cake
Cake day: August 6th, 2023

help-circle

  • The assumption is that legitimate companies who sell software will sign it and that signature proves it came from that company who you trust because of their publicly known legitimacy. It’s a bit of circular reasoning. But it does round back towards that legitimacy - if it is found that they violate your trust, they lose public trust and thus lose sales.

    Luckily new OSes (cough NOT WINDOWS) are able to sandbox applications and prevent them from accessing resources without declaring the need to access it.

    And as for the signing certificate, I think the MS Store will allow any signed app. They just offer the cheaper signing service.















  • Yeah that’s the case with programming… well anything. This at least gives you a way to automatically receive all of that data from any app without excessive prior knowledge. With a small amount of info you can filter for specific events and create all kinds of robust functionality. That’s the power of a set protocol - it is to make things widely compatible with one another by only depending on the dbus protocol and app name. Otherwise you may need to depend on some shared objects which makes deployment and maintenance a total clusterfuck.

    https://en.wikipedia.org/wiki/Coupling_(computer_programming)





  • That is glossing over how they process the data and transmit it to the cloud. The assistant wake word for “Hey Google” invokes an audio stream to an off site audio processor in order to handle the query. So that is easy to identify via traffic because it is immediate and large.

    The advertising-wake words do not get processed that way. They are limited in scope and are handled by the low power hardware audio processor used for listening for the assistant wake word. The wake word processor is an FPGA or ASIC - specifically because it allows the integration of customizable words to listen for in an extremely low power raw form. When an advertising wake word is identified, it sends an interrupt to the CPU along with an enumerated value of which word was heard. The OS then stores that value and transmits a batch of them to a server at a later time. An entire day’s worth of advertising wake word data may be less than 1 kb in size and it is sent along with other information.

    Good luck finding that on wireshark.


  • Once you get the hang of it, you can win like 95% of the games.

    In the first ten levels, starve yourself and only eat at 30% hp.
    Use corners and other obstacles to your advantage to get sneak-attacks. Don’t equip any unidentified equipment if possible - especially if it is suspiciously high level for the area. It is probably cursed. Save up your upgrade scrolls until you find some tier 4 or 5 weapons and armor. If you’re a mage, just dump them in your wand of fire from lvl 1 with no regrets.
    Learn how the bosses attack. The slime hits really hard after charging, so figure out how to dodge or get out of range.