It's one big macOS/Windows/Linux install where everything from crypto wallets to credential files to gimmick apps are all neighbors. And the tools for partitioning these things are all pretty bad (and mind you I'm about to pitch something probably even worse).
When I'm running a few Windows VMs inside macOS, I kinda get this vision of computing where we boot into a slim host OS and then alt-tab into containers/VMs for different tasks, but it's all polished and streamlined of course (an exercise for someone else).
Maybe I have a gaming container. Then I have a container I only use for dealing with cryptocurrency. And I have a container for each of the major code projects I'm working on.
i.e. The idea of getting my bitcoin private keys exfiltrated because I installed a VSCode extension, two applications that literally never interact, is kind of a silly place we've arrived in personal computing.
And "building codes for software" doesn't address that fundamental issue. It kinda feels like an empty solution like saying we need building codes for operating systems since they let malware in one app steal data from other apps. Okay, but at least pitch some building codes and what enforcement would look like and the process for establishing more codes, because that's quite a levitation machine.
The point being, my movements around the homepage aren't tracked and used for pushing more ads. My microphone isn't being recorded for AI training or recommendations algorithms. The intricate ways I use the platform isn't being sold to some third party data company. I just open the film, and it works..
Your IP address being logged in a bittorrent swarm is far less concerning to me than the 100 page privacy policy which explains how they will take rectal scans and sell them to cancer research agencies or something.
But I still hope that we can someday actually have some meaningful improvements in speed too. Diffusion models seem to be really fast in architecture.
Unil a judge says they must log everything, indefinitely
it's also reasonable to assume he had more information about the state of the location given his access as an employee, particularly given that it was a full two months before he actually retrieved them
I'm curious, where is it clear in the thread that he got permission?
Said the guy who proceeded to follow their lead. I get it he was a BT employee so may have not been trespassing, but he appeared to have a change of mind about the possibly quite unsafe environment.