Founder @ Phish Report 🎣
I'm stuck with eufy with its stupid 1.5GB app. literally the largest app on my phone. larger even than my podcast player including all downloaded podcasts
I'm stuck with eufy with its stupid 1.5GB app. literally the largest app on my phone. larger even than my podcast player including all downloaded podcasts
I'd assumed it was done in the "the md5 of this sentence begins..." style where you just have enough entropy (via e.g. alternate phrasing) to guarantee collision
(the dithered art style seemed good for hiding that entropy)
I'd assumed it was done in the "the md5 of this sentence begins..." style where you just have enough entropy (via e.g. alternate phrasing) to guarantee collision
(the dithered art style seemed good for hiding that entropy)
(assuming it's an old-school machine with rotating drums which could have those symbols adjacent)
(assuming it's an old-school machine with rotating drums which could have those symbols adjacent)
Those get uploaded to bsky, and the client gets a list of hits back -> this tells them which of their contacts have bsky accounts
cleaner than a separate GUI window, but without the overhead of maintaining separate extensions for intellij, vscode, zed, etc.
cleaner than a separate GUI window, but without the overhead of maintaining separate extensions for intellij, vscode, zed, etc.
noooo they need to go into the void, never to be recovered
but ok yeah that seems pretty great, and even open source!
noooo they need to go into the void, never to be recovered
but ok yeah that seems pretty great, and even open source!
The link to their website is an outlook safelinks url?
They're not even a security company, they're a "hide the fact you used an LLM" tool???
The link to their website is an outlook safelinks url?
They're not even a security company, they're a "hide the fact you used an LLM" tool???
Partitioning the cache by tenant very slightly reduces hit rate, but you'll sleep better at night knowing there's no novel attacks out there
Partitioning the cache by tenant very slightly reduces hit rate, but you'll sleep better at night knowing there's no novel attacks out there
Those get uploaded to bsky, and the client gets a list of hits back -> this tells them which of their contacts have bsky accounts
Those get uploaded to bsky, and the client gets a list of hits back -> this tells them which of their contacts have bsky accounts
A's contact list includes B
*and*
B's contact list includes A, I think that could work safely?
A's contact list includes B
*and*
B's contact list includes A, I think that could work safely?