Interesting to call out that it’s not designed for pets. I know several people with AirTags on their pet collars.
This is why the FBI can compel Microsoft to provide the keys. It's possible, perhaps even likely, that the suspect didn't even know they had an encrypted laptop. Journalists love the "Microsoft gave" framing because it makes Microsoft sound like they're handing these out because they like the cops, but that's not how it works. If your company has data that the police want and they can get a warrant, you have no choice but to give it to them.
This makes the privacy purists angry, but in my opinion it's the reasonable default for the average computer user. It protects their data in the event that someone steals the laptop, but still allows them to recover their own data later from the hard drive.
Any power users who prefer their own key management should follow the steps to enable Bitlocker without uploading keys to a connected Microsoft account.
starting with a bare ubuntu desktop system with plenty of RAM and CPU, setup three ubuntu VMs for secure development and networking skills learning (wireshark, protocol analysis, etc etc):
one ubuntu “virtual” desktop to simulate a working desktop that an end-user or developer would use. its networking should initially be completely isolated.
one ubuntu server to simulate a bastion machine. route all “virtual desktop” traffic through this “bastion”. it will serve as a tap.
one ubuntu server to serve as edge node. this one can share internet access with the host. route all bastion traffic through the edge node.
use this three vm setup to perform ordinary tasks in the “virtual desktop “ and observe the resulting traffic in the “bastion”. verify that no other traffic is generated on or from the host outside of the expected path virtual desktop -> bastion -> edge.
i claim this is a minimal “network clean” development setup for anyone wanting to do security-conscious development.
extra credit: setup another isolated vm sever to act as the package manager ; ie mirror anything to be installed on the “virtual desktop” onto this package server and configure this server as the install point for apt on the “virtual desktop”.
i doubt an AI can set this up right now. (i’ve tried)
I'll think on it :)
“ the median age of the latest Y Combinator cohort is only 24, down from 30 just three years ago “
does yc publish stats to validate?
Can you confirm that is what you prefer?
We have to screen very carefully for fraud from overzealous authors, unfortunately. Email is a nice tool in that.
i understand that it’s easier to get a stronger “trust” signal by being more invasive
but hopefully the product will be so valuable that users will value their accounts as assets (like on hn) that they won’t want to compromise with bad behavior
Why? Decode the QR code and store the text however you prefer to store text.