FLOSS virtualization hacker, occasional brewer

  • 8 Posts
  • 336 Comments
Joined 1 year ago
cake
Cake day: June 9th, 2023

help-circle
  • There is a very large corpus of FLOSS software out there serving everything from individual itches to whole industries. Any project that is important to someone’s bottom line is likely to have paid developers working on it but often alongside hobbyists.

    The project I predominately work on is about 90% paid developers but from lots of different companies and organisations. Practically though the developers don’t care about the affiliation of the other developers they work with but the ideas and patches they bring to the project.








  • I can see the argument that visible light should be enough given we humans can drive with just two eyes and a few mirrors. However that argument probably misses the millions of years of evolution of our neural networks have gone through while hunting and tracking threats that happens to make predicting where other cars might be mostly fine.

    I have a feeling regulators aren’t going to be happy with a claim of driving better than the average human. FSD should be aiming to be at least 10x better than the best human drivers and we’re a long way off from that.










  • Absolutely - modern pirates are extracting the digital streams with the DRM removed. However they closely guard the methods of operation because once the exploits or compromised keys are known they can be revoked and they have to start cracking again. They likely have hardware with reverse engineered firmware which won’t honour key revocation but still needs to be kept upto date with recent-ish keys.

    For example the Blu-Ray encryption protocols are well enough known you can get things working if you have the volume keys. However getting hold of them is tricky and you have to be careful your Blu-Ray doesn’t read a disk that revokes the old keys.

    For streaming things are a little easier because if you get the right side of the DRM you can simply copy the stream. However things like HDCP and moving DRM into secure enclaves are trying to ensure that the decryption process cannot be watched from the outside. I’m sure their are compromised HDCP devices but again once their keys get leaked they will no longer be able to accept a digital stream of data (or may negotiate down to a sub-HD rate).