I wanted to make it in chronological order. You’d know that if you read books.
I wanted to make it in chronological order. You’d know that if you read books.
Yes, this is it. I bought it because it was cheap (100€) and had a built-in CPU. The only problems are that it hasn’t got many SATA or PCIe ports. This is fine however, because I have no need for them right now.
You just changed half my life.
That’s exactly what a bot would say.
This is a custom built mini PC, with a mini-ITX motherboard and an Intel N100 CPU. It gets powered by a power supply that I got from an old computer. Also, it needs no active cooling, just a heatsink. It almost never gets above 60°C.
(and yes, it has no case).
In it I run:
No I don’t think so (upvote).
Is it just me, or have I seen like 6-7 of these posts at this point?
This isn’t a non-politics community. There’s no rule banning politics in the sidebar.
By non-politics I meant that this is not a community dedicated to politics, not that politics are banned or something like that.
If you want this community to get rid of politics, maybe you could engage in a political campaign to get the assent of the users and then bring your policy proposal to the moderators with a political argument in favour of non-politics.
I didn’t say that I want this community to get rid of politics, but that this post doesn’t belong in this community and it is better to be posted somewhere else.
I know I will probably get downvoted but:
Oh, I missed the L1 in the title. Basically, all the decryption at L1 is happening inside a Trusted Execution Environment. This is a dedicated chip that does all encryption-decryption (among other things). This is why it is so difficult to extract the keys, because they don’t enter the CPU or are stored in RAM, because the dedicated chip handles all of these.
So I don’t think you can find a guide about this, because if anyone has found even one exploit, they would be keeping it to ourselves, so that it doesn’t get patched.
Although it is very difficult, I think the only real solution is to reverse engineer a TEE and find an exploit yourself.
If you manage to do this, please let me know! I am happy to get updates about progress in this topic.
I have heard about a TamperMonkey userscript called EMELogger that logs some information about EME, in the web tools console making it easier to get the PSSH. I haven’t tried it though.
Also, I don’t think you will find guides on paid content as this is considered highly illegal (I think).
The edit makes it worse, it gives me another reason to downvote.
You dropped this: /s
I just bought Portal and Portal 2 and finished them both. Very good games, with great puzzles and story.
I am planning to buy more from Valve in the future.
P.S: This was a triumph
We have finally found The Forbidden Knowledge
Oh thanks, I didn’t know about this!
Unfortunately, many of the cars transmit the surveillance data through phone carrier data lines, using an embedded SIM card. So, sadly I don’t think this would help very much.