

Who’s in the middle of this Venn Diagram between “uses some kind of custom OS on their phone to where their camera app doesn’t automatically read QR codes” and “doesn’t know how to install or use software that can read QR codes”?


Who’s in the middle of this Venn Diagram between “uses some kind of custom OS on their phone to where their camera app doesn’t automatically read QR codes” and “doesn’t know how to install or use software that can read QR codes”?


I don’t have a phone that can scan QR codes.
QR codes are a plain text encoding scheme. If you can screenshot it, you have access to FOSS software that can decode it, and you can paste that URL into your browser.


Honestly, this is an easy way to share files with non-technical people in the outside world, too. Just open up a port for that very specific purpose, send the link to your friend, watch the one file get downloaded, and then close the port and turn off the http server.
It’s technically not very secure, so it’s a bad idea to leave that unattended, but you can always encrypt a zip file to send it and let that file level encryption kinda make up for lack of network level encryption. And as a one-off thing, you should close up your firewall/port forwarding when you’re done.


Yeah, if OP has command line access through rsync then the server is already configured to allow remote access over NFS or SMB or SSH or FTP or whatever. Setting up a mounted folder through whatever file browser (including the default Windows Explorer in Windows or Finder in MacOS) over the same protocol should be trivial, and not require any additional server side configuration.


Yeah, I mean I do still use rsync for the stuff that would take a long time, but for one-off file movement I just use a mounted network drive in the normal file browser, including on Windows and MacOS machines.


Also as a result, that opens up Apple’s discounting strategy where it sells the one-year-old model as a discounted model. If an Apple model can get updates 6 years after release, then buying an 18-month old model (but as a new phone) still assures you of 4.5 years of updates.


Yeah, looks like a series of voluntary tags in the metadata. Which is important, and probably necessary, but won’t actually do much to stop deceptive generation. Just helps highlight and index the use of some of these AI tools for people who don’t particularly want or need to hide that fact.


How would they get past the other factor, the password?
If you’re gonna say “SMS can be used to reset the password” then it starts to sound like you’re complaining about insecure password reset processes, not 2FA.


Yeah, Spotify is trying to force the same thing with a similarly muddled interface.
YouTube Music is still worse, though, in that it’s also tied to YouTube the video hosting service, plus a music streaming service, plus a podcast streaming service.


Legacy nodes (known in the industry as “mature” nodes) remain in use after they’re no longer cutting edge. Each run teaches lessons learned for improving yield or performance, so there’s still room for improvement after mass production starts happening.


I will add that nodes don’t stay still, either. A 2025 run on a node may have a bunch of improvements over a 2023 run on that same node.
And Google’s jump from Samsung to TSMC itself might be a bigger jump than a typical year over year improvement. Although it could also mean growing pains there, too.


Well, by the time the Pixel 10 comes out, it’ll be 2 generations after the iPhone that used a SoC from TSMC’s 3nm node (the A17, used in iPhone 15 Pro, launched September 2023). I’d imagine it’ll have caught up some, but will still behind while Apple is presumably launching something from TSMC’s 2nm or A14 node at the same time.


Nah, that’s just anticipating customer rage. When I worked in restaurants I learned very early on that it’s better to put things in a smaller container, and put the overflow into a separate container, rather than try to give them a little extra in the next size container that doesn’t get filled up.
It’s the meme with the kid failing to understand that the amount doesn’t change just because the container changes. Only with angry adults who want their money back.
For my personal devices:
I’ve worked with work systems that used RedHat and Ubuntu back in the late 2000’s, plus decades of work computers with Windows. But I’m no longer in a technical career field so I haven’t kept on top of the latest and greatest.


Yes, but an absence of a proof of the positive is itself not proof of the negative, so if we’re in the unprovable unknown, we’re still back at the point that you can’t prove a negative.


Yes but can you prove by evidence that there is no milk in my cup, if I won’t let you look inside?


Those small USB drives are too slow anyway, often limited to USB 2.0 interfaces or slow flash modules. I’ve switched over to an SSD specifically because of how slow booting and installation is from a standard 10-year-old USB stick.


every distro I’ve tried has a strong sense that if you’re using the GUI you don’t need or deserve admin controls
It’s more that GUI programs can’t be trusted with root privileges. They’re not designed for that, and can break things in unpredictable ways.


Apple, too. The 2012 MacBook Pro had a high DPI display, and everything scales normally even when dragging windows over to non-HiDPI external monitors.
That’s not even getting into the mobile OSes, which have to deal with nonstandard display sizes and resolutions all the time, across multiple settings for accessibility.
End to End Encryption protects the messages *between the ends". If an “end” is compromised the best E2EE technology isn’t going to protect confidentiality.
Just ask Pete Hegseth, who invited a journalist into an E2EE signal chat. The journalist was an authorized “end” and could therefore read the conversation.
This change is about employers who already have full access to the “end” of the Android phone itself when that phone is in an enterprise managed state. Perfect encryption between that phone and other parties doesn’t change anything because the employer has full access to the phone itself.