Any idea if that works in modern VMware Workstation? It's currently on version 17, whereas that post was for version 6.5.
VMware Workstation has such disjointed development spurts that it wouldn't surprise me if the feature had been ripped out at some point. Other useful features such as machine groups have been. :(
It's probably still a good example. Looking up the CVEs for various search terms:
coreutils: 17 results
linux kernel: 6752 results
x11: 184 results
qt: 152 results
gtk: 68 results
docker: 340 results
rust: 455 results
python: 940 results
node: 110 results
javascript: 5657 results
firefox: 3268 results
chrome: 3763 results
safari: 1465 results
webkit: 1346 results
The large monolithic codebases have a lot more CVEs. I'd also argue that patching a fix on code made up of small, modular parts is much easier to do, and much lower hanging fruit for any casual developer to submit a PR for a fix.
> This is to let the military use AI to help kill people.
So are your tax dollars, and some portion of any money you spend or any productive engagement you have with the economy wherever you live on this planet.
The timeline backup is encrypted clientside before upload.
Meaning no casual FBI or police warrant is gonna vacuum it up (at least not from Google, they’ll just go to the cell providers / towers instead as siblings have pointed out).
Obviously yes NSA and CIA and various other nation state attackers will just get it directly off your phone or evil maid you or surveil you in any number of other more traditional ways.
Someone mentioned geofence warrants, i.e. cops/feds asking "Hey Google, tell us which accounts had devices found in these time-space coordinates!", I guess they'd be asking mobile providers to do more logging as an alternative.
A Google account is probably more useful than a SIM card, which might be anonymous or have exchanged hands from the registered buyers, if you as a cop can ask Google to hand over the emails or IPs used by this account, you can find the person's identity and address (if using home IPs subpoena-able by asking the ISP).
I wonder if it's not just American police, imagine this question being asked by Russian FSB, or the "good guys" in the form of the Israeli authorities.
The cell providers actually do erase this data. I tried to subpoena it for a murder suspect to help show he wasn't at the scene, but he left it too late, and Verizon said that they delete their data after 5 years. I don't know the timescales of the other networks.
Not to say that the NSA don't have it all backed up -- I'm sure they do -- but for warrant (i.e. legal process purposes) it probably has a shorter timespan than the Timeline data stuck on Google's infra.
And for a brief couple years Google had an offering the world could use that exposed that invention. Via the stock, well respected LXC tool.
They created something, only to never ever use it in public eye. To go keep reinventing and keep NIH'ing. The android virtualization stack is fucking wild, and hardly used, offers such a meager fraction of what ChromeOS was doing.
Not a bad callout, but this seems like a particularly glorious & vicious slam... that doesn't change the big picture on iota.
It's somewhat unusual for Google to open source and mainline this bit of functionality. Last time I heard, Google's internal production Linux kernel still has 9000+ patches[0] on top of vanilla Linux. And I'm still waiting for them to open source switchto[1].
Cgroups is a kernel feature, parent is talking about the userspace stack for managing containers. Google uses LXC in crosvm, and didn't have to program it from scratch.
http://stackframe.blogspot.com/2007/10/configuring-applicati...
http://www.replaydebugging.com/2008/08/vmware-workstation-65...