Maybe the same way Steve Jobs did the no plate thing. Maybe he just keeps cycling them. Might even send them to the labs at Ford for destructive analysis after each one is legally done.
"It’s a testament to their persistence that they’re managed to keep this up for over 10 years, and I for one will be buying Denis/Masha/whoever a well deserved cup of coffee."
Revealing publicly available information (actually publicly available, in the sense of "any person can easily look this up", not "publicly available" in a sense of "publicly available in leaked databases", which actual doxxers use as an excuse for their actions) isn't doxxing.
Doxxing has never been restricted to just leaked databases. I'd argue that any publishing of personal information in a context in which the individual clearly doesn't want to be identified counts.
The owner of the site is not identified anywhere on the site itself. And I think we can both agree that it's the sort of site whose owner would prefer to remain as anonymous as possible. The blog post digs up information about the owner from whois records, which do count as easily accessible public information, but then links to Kiwifarms of all places, and goes on to talk about identifying writing patterns and doing "detective work" involving cross-referencing profile pictures of accounts on various websites that were obviously not intentionally linked together by their owner. This is a textbook doxxing attempt.
no? A file system is the format that the data on the disk is stored as. If you mount an ext4 disk as ntfs, it wouldn't load properly. It's not just the interface for loading the data, it's how the data is actually stored.
There's no concept of "external". What would it be, "USB" or anything mounted under /mnt or /media? What if it's the root OS drive of another computer you're trying to fix connected through a USB-SATA adapter? Should any program running with minimized privileges get to overwrite even root files in that OS drive?
I think that it's a pretty good heuristic that if permissions exist in the filesystem, they matter and shouldn't be ignored.
They shouldn't be ignored. but they can be ignored, is the problem. File permissions are not encryption or security: If I can't read a file on this machine, because I'm not root, I'll just move the drive to a different machine where I am root.
But I agree with you, they do have a use and to some use cases matter, and we shouldn't arbitrarily decide to ignore them.
Wireless Android Auto or Carplay generally use BT to setup but WiFi to send the bulk of the graphical data over.
That said, there are adapters to make an existing Android Auto Wireless if you want it. I think some are sold on Amazon too so you could probably try and maybe return. I don't have any experience with them since I'm very happy with my car's built in wired Android Auto and the reliability of cabling but it is something you can try.
I have one for my wife's car that has wired-only CarPlay. The dongle can do Android Auto as well. It has a bit of lag compared to wired or built-in wireless CarPlay (have used that in rentals) but it's not really an issue for usability. It was maybe $30.
> ACM is pleased to share an important milestone for the computing field. Beginning January 2026, all ACM publications and related artifacts in the ACM Digital Library will be made open access.
If your paying $500 for an O’Reilly subscription, then the $99 membership plus $75 add-on for O'Reilly would seem to make it so even if you don't use any of the other facilities:
> unlimited access to ACM's collection of thousands of online books, video courses, interactive sandboxes, practice labs, and AI-enabled tools from O'Reilly and Skillsoft Percipio
reply