• 0 Posts
  • 19 Comments
Joined 1 year ago
cake
Cake day: June 23rd, 2023

help-circle
  • Tesla Model Y owner here (never again, either). I hate the touchscreen, and also hate the way they’ve shoehorned functionality into the button/scroller controls on the steering wheel to try to address complaints.

    When I first got the MY, the only way to control things like the wipers was through menus in the touchscreen. A software update introduced the ability to control them from the steering wheel controls, but even that “solution” sucks. You have to press & hold the control down while simultaneously scrolling it with your thumb. And most times you can’t scroll it from all the way off to all the way on in a single motion, so you press, scroll as much as you can, release & press again then scroll the rest of the way. A real PITA.




  • IphtashuFitz@lemmy.worldtoPrivacy@lemmy.mlfixed
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 month ago

    I doubt it would help. My employer uses Akamai as a CDN & security provider for our websites. Their bot analysis tools regularly flag distributed bot activity that can come from a handful or a few thousand IPs. They do a range of browser fingerprinting, TLS fingerprinting, etc. to uniquely identify traffic across ranges of IP’s. I’m sure Google/Youtube has the ability to do this as well.

    Any given client would need to regularly randomize the order of headers in requests, randomly include/exclude optional headers, and also randomize TLS negotiation to try to circumvent all the fingerprinting these big corporations perform.


  • The problem is computer vision has a LONG way to go before it’s truly on par with human eyesight. Musk loves to crow how cameras are sufficient since we use our eyes to drive.

    The thing is, eyes have special neural circuits that detect motion. They essentially filter out unnecessary information and send just the motion details to the brain. This prevents the brain from being overloaded with every detail the eye constantly sees.

    And being overloaded with everything is exactly what computer vision currently does. It’s just a stream of images that the computer must analyze completely. So it’s working exactly opposite to how the eye & brain works.


  • I recall when I bought my first hybrid that the dealer said there were something like 15 different computers controlling things, from the ICE engine to the transmission to the charging of the battery, etc. They weren’t networked together.

    I also once ran afoul of a software bug in the ECU of a Honda CR/V. That’s the embedded system that manages the whole operation of the engine - from fuel injection to timing to emissions etc. As they progress through model years they use different ECUs that require different software. Even though I work in IT, I wouldn’t feel comfortable trying to update it myself, given the different models, firmware revisions, etc. I was more than happy to take that car to a dealer to have them confirm my car had buggy software and to upgrade it to the right new version.






  • My employer had an EV cert for years on our primary domain. The C-suites, etc. thought it was important. Then one of our engineers who focuses on SEO demonstrated how the EV cert slowed down page loads enough that search engines like Google might take notice. Apparently EV certs trigger an additional lookup by the browser to confirm the extended validity.

    Once the powers-that-be understood that the EV cert wasn’t offering any additional usefulness, and might be impacting our SEO performance (however small) they had us get rid of it and use a good old OV cert instead.




  • Port 22 is the default SSH port and it receives a TON of malicious traffic any time it’s open to the whole internet. 20 years ago I saw a newly installed server with a weak root password get infected by an IP address in China less than an hour after being connected to the open internet.

    With all the bots out there these days it would probably take a lot less time if we ran the same experiment again.


  • IphtashuFitz@lemmy.worldtomemes@lemmy.worldAnarchy Easter Eggs
    link
    fedilink
    English
    arrow-up
    43
    ·
    2 months ago

    This reminded me of a glass artist named Josh Simpson who is known for his glass spheres he calls “planets” that have amazingly complex scenes in them. For over two decades he’s had what he calls the “Infinity Project” where he encourages people to hide them out in the open where folks are unlikely to find one. If you submit a proposal to him that he likes then he’ll send you two of his smaller planets, one for you to hide and one to keep for yourself.




  • Not easily. The scammer likely has your current address & contact info, but knows nothing about your history.

    To confirm your identity when you contact these reporting agencies they will use details from your credit history by asking detailed questions the scammer likely won’t know. For example it might be questions like these:

    • What kind of car did you purchase in 2005?
    1. Honda
    2. Ford
    3. Saab
    4. Jeep
    5. None of the above
    • Which one of these companies did you work for previously?
    1. IBM
    2. Pizza Hut
    3. Macy’s
    4. Jiffy Lube
    5. None of the above

    They’ll throw 3 or 4 questions like these at you that you’ll have to answer correctly. They might involve places you used to live, banks you have had accounts with, etc. The chances of a scammer with your SSN knowing all these details about you is pretty tiny.


  • The credit monitoring companies have your up-to-date contact information (and verified) when you put the freeze in place. Now, should a third party try to open an account, etc. in your name it should be blocked from happening and the credit monitoring company should contact you.

    If a scammer tries to unfreeze or otherwise modify your account with them they should also contact you.

    If/when they contact you or you request your account be unfrozen then they’ll use old credit history to confirm your identity. These are a series of three or four random questions that a scammer is unlikely to know. For example they might ask you what kind of car you purchased in 2005, then give you 4 options, like Ford, Honda, Jaguar, or BMW, and then also a “nine of the above” option. Then they might ask you which of the following street addresses you used to live at, and list 4 seemingly random addresses, one of which you might have lived at.