I’m thinking the code is obfuscated by random calls to various functions so that the code block isn’t just one section you can easily see but sprinkled throughout instead.
Just another guy abandoning the old internet.
I’m thinking the code is obfuscated by random calls to various functions so that the code block isn’t just one section you can easily see but sprinkled throughout instead.
Sounds like all the JavaScript I’ve ever seen.
Isn’t this the RockPi? Or is the RockPi just based on the RK3588? It’s great for open-source but good lord are these SBC’s astronomically high.
We had to walk a delicate line with our kids (2005-2017) when it came to interaction online. Never wanted them to feel like we were keeping them from experiencing the knowledge or social interaction the internet provided. But we also kept close tabs and paid special attention to specific behaviors. So if they were in their netbooks we’d make it a habit to walk behind them not to look but just to see what their reaction would be. Kids mostly know right from wrong and when they feel it “might” be wrong they try and hide it from their parents. If you pay attention you’ll see them “hiding” and that’s a sign to dig deeper. This way they maintain their privacy and any issues can be brought to light with them directly.
(Understand that the following will have specific details changed just for anonymity’s sake) Grooveshark was the first interaction we saw was troublesome. So we sat our daughter down and asked her direct why she was trying to hide her netbook from us seeing it and what had she been doing she felt she needed to hide? The alternative was to relinquish the netbook until she told us. Come to find out a friend of hers from school (female 2 years older) was trying to slowly convince her to lie to her parents and sneak off with her. Our daughter told us this because it scared her not because she would lose her access. We also stayed open and active with our kids indulging in the same things they were interested in (Minecraft, Guitar Hero, etc) regardless if it was explicitly something we enjoyed. So she didn’t lose access to Grooveshark because she really loved listening to music. We just kept an eye on it and she removed her friend from communication. We explained what she was likely attempting and her friend admitted to it. They’re not friends now but it never happened again.
Don’t get me wrong, we made tons of bad calls before we learned what worked. But the key to all of it is paying attention. Not hovering over them and stopping them from making mistakes. But watching the nuance of their interactions with everyone around them. If they start to get secretive then there is usually a reason. And it’s best to just talk to them about it. And if one conversation doesn’t do it then have multiple conversations. Listen to what they have to say and why they were being secretive. Works best when they’re not expecting it too (like in the middle of playing Minecraft together). Anyway that’s just IMHO.
I love Tabby simply because it allows me to set it up like the drop down terminal in Quake. Specifically its capabilities make my use of it easier and far more capable than something like guake.
It’s more than likely they “borrowed” some other Chinese company’s cloned Windows drive and used it for their install rather than roll their own. Could be they were malicious but coming out and claiming it was an error so quickly doesn’t really push that narrative hard.
According to this Tom’s Hardware article (https://www.tomshardware.com/desktops/mini-pcs/mini-pc-maker-ships-systems-with-factory-installed-spyware-acemagic-says-issue-was-contained-to-the-first-shipment) it isn’t firmware based spyware but just existing on the machine drive.
They were also found on the restore partition so a full wipe and fresh install would eliminate the issue. AceMagic have also claimed that the issue was isolated to the first round of shipments.
I mean depending on what board you’re using it’s unlikely it’s hardware level snooping that supersedes changing the firmware. Especially if you stick to those that run on open source firmware.
Thank you. I was hoping to be able to see trends over a few years rather than over small quarters.
Really wish I could see popularity spanning over years rather than a quarter. Maybe I’m missing a setting somewhere I’m not seeing.
Why do you need a headphone jack? Any DAC in a phone is going to be useless if you’re saying because of HiFi Audio. And when it comes to using a HiFi DAC I’d much rather just use a USB-C powered port for my headphones.
iOS is based off of Darwin which was based off of BSD Linux. So was MacOS for that matter.
I want to believe this is all /s but I haven’t gotten the feel of Lenny quite yet.
Funny this is pretty close to the truth when it comes to the things described in this thread.
Poop Knife - Bad diet, large BM’s = financially poor diet = trailer Frog Tongs - trailers tend to have bad gaps in windows Etc
Ours has a magnet and is stuck to the toaster. Long since abandoned since most cants with ridges don’t like to open well without just using a can opener and removing the whole can lid.
Not to mention using white phosphorus bombs as well. I’m not for either side but it’s time Israel is held accountable for war crimes.
Yeah I have an Rpi Zero for interfacing cheaper devices with HomeKit so I feel you. I’m just not going to use an Echo Dot when I already have a bunch of HomePods lol.
Sadly a Kobo doesn’t support my Kindle library without a good bit of extra steps that, from my experience, can wreck some books.
This is probably the worst website I’ve ever seen. 9000 ads for 15 words.