Wait… Even if users don’t pay for this, their car still comes a WWAN module that is hardwired to their ignition. Yes, I realize it’s more likely bolted on to the infotainment system and/or the car’s RTOS, but it’s still baked in.
Wait… Even if users don’t pay for this, their car still comes a WWAN module that is hardwired to their ignition. Yes, I realize it’s more likely bolted on to the infotainment system and/or the car’s RTOS, but it’s still baked in.
It’s all relative. My cheap Chinese spyware SmartLife devices are free to report the hours I turn my lights on back to China as they please, but they sit on a segmented VLAN with per client isolation.
If they ever EOL’d them, I’ve got more than my money’s worth, and yes, some of them can be flashed, but I’d probably just buy another well established cheap Chinese competitor.
But I agree, the above is not the use case and situation for every IoT device out there, and there are plenty of devices that I would never consider an internet/SaaS dependent version of e.g. medium to large home appliances.
As others have said, fast opening quick notes with basic formatting.
For example, if I get an unexpected call I need to write down more than a call back number, Wordpad was my go to.
Well, at least when back when I used Windows regularly.
Dell’s inside sales team probably has a much flatter bell curve, performance wise, then their outside (traveling) reps.
So yes, they are looking to do a layoff without the headlines, or severance, but probably aren’t as concerned where on the bell curve those employees rank.
Middle and lower management of those teams is absolutely sweating bullets about their teams getting wrecked, but big picture, whatever impact the C Suite is expecting, clearly isn’t enough to outweigh whatever net outcome they’re hoping for here.
Edit: also, I pretty much guarantee that any of their far high-end outliers on the inside sales team bell curve, will be given an exemption by whoever is 2 or 3 levels above their direct manager.
Handjobs are never worth it, and at this point in my life, if I ever received a good handjob, it would set off all my red flags alerts and alarms.
Of course, I am speaking as a straight man. I’m assuming gay men don’t have this problem, but can’t speak to that with any authority.
Sure, as long as the device doesn’t automatically connect to open networks, and if it does, you don’t live in an apartment, or moderate density area with available open wi-fi networks in range.
“I keep overcooking my steak, any advice?”
“I haven’t had meat in 40 years, have you considered simply going vegetarian?”
Edit: FYI the key to cooking a good steak is salt, butter, and to flip it every 30 secs, until you’ve reached your preferred level of doneness. If you’re really trying to impress, and don’t care about a heart attack, you can also baste with butter in between each flip.
Now, learning how much time it takes for each different type of cut and the variations within, that mostly comes with experience.
If there are open wifi networks near your TV that you can’t lockdown, you’ll want to confirm it your make/model is known to automatically connect to those, and then take whatever mitigation steps are justified for your own use case.
For example, if you have multiple TVs, maybe you can swap models around based on their capabilities and location, or look up the schematic for the TV and see if it’s easy to block it’s internal antennas.
Or maybe that seems like too much of a hassle and you just say fuck it, and don’t worry about it. Which is always an option, because given how much data already gets sucked up by surveillance capitalism, my evening TV viewing habits have to be some of the lowest value data points, as I already block ads and avoid all ad supported services.
I pirated for a long time, and even though I had(have) large media libraries and the home server capacity to manage everything just fine, I stopped.
Not sure when, or why, I’m guessing a service broke and I just said fuck it, I already have Prime+Netflix, and that was years ago at this point.
Netflix’s password policy and Amazon showing adds had me spin them up again, and even migrate over to Jellyfin because Plex is just another enshitified privacy nightmare.
Which was a pleasant surprise, because the last I tried Jellyfin years ago, it was not worth the hassle. Also, Plex wasn’t nearly as bad as it is now.
To swing this back around to this article, I’m betting eventually they’ll force their TVs online by disabling features, capabilities, or even the device itself, if it’s not phoning home.
I think you’ve confused my previous comments as some sort of moral equivocation, which they really weren’t meant to be, but since you brought it up…
You may believe that America’s intelligence agencies, on balance, are more moral than Russia, and you’re probably right, but that is damning by faint praise.
Espionage is literally the act of committing crimes on behalf of a government. It’s not altruistic and it’s not used to fight the good fight of corruption, or the mafia. In fact, it’s often done in conjunction with those actions and organizations, because that is what the job often requires.
Either way, Russia doesn’t need Kaspersky to run its domestic surveillance network or it’s myriad of police state apparatuses.
FYI oftentimes terrorism is blowback from actions taken by intelligence agencies years, or decades, prior. That is, the groups and ideologies they fund, train, and use, for their own ends, don’t cease to exist just because they’re no longer useful, or needed, by those agencies.
Retail generates the most margin, while enterprise generally the most revenue.
At least, that’s how it works at most vendors that operate both B2C and B2B sales and product channels.
But no, Kaspersky is a major legacy player in the B2B security market with both mature and cutting edge products/solutions.
A better question might be, which companies in America were still using Kaspersky up until this month, and why.
My guess that is a mix between budgetary constraints, incompetence, and weighted risk analysis.
Imagine you’re a Midwestern ice cream wholesaler, it’s been a bad few years, and your 200 Kaspersky licenses were renewed with deep discounts.
You’re not likely to lose any contracts for using Kaspersky, nor be a target of state sanctioned espionage, but spending $10,000 between new licensing and man hours, to rip, replace, and configure a new solution, now that could cause real issues for you.
So, between a rock and a hard place, you just wait it out as long as possible and hope that when the other shoe drops, it doesn’t wreck your budget.
No problem, happy it helped.
Your summary is mostly accurate, but I think a better way to understand it would be like this:
Low level security software, by nature, is the ultimate attack vector, if compromised.
Assume that all countries that have both a domestic tech sector, and a well-resourced national security apparatus, have some version of on demand government initiated supply chain attack capabilities.
So it’s not like I believe that all Kaspersky installs include a RAT piped directly to some GRU/FSB unit, just the ability for a malicious payload to be inserted - just as the NSA can do with American tech companies.
Not every risk can be mitigated, but some risks just shouldn’t be taken.
That is so wrong that it’s actually impressive.
Either you’ve never worked in this space, or because it wasn’t present in the few IT departments you’ve worked in, you extrapolated that to mean it wasn’t present in any large organization.
By all means, I don’t disagree that American firms should not be using Kaspersky, just as Russian firms should not be using Sophos (UK based), but to pretend that they aren’t one of the oldest and most well-established brands in the space is misinformed at best.
I think you confused the fact they have a retail product presence, to mean that they don’t have serious enterprise solutions, but they do: NDR, XDR, agentless for hypervisors, etc.
Yes… no… sorta…kinda… but no different than how most, if not all, large American security and tech vendors have either overt, or covert, links to the the American Security State.
Kaspersky is a long established credible actor and leader in the threat research space, hands down one of the best track records over the long run, and you should take their reporting and disclosures seriously.
I’m not saying that to dismiss the very valid concerns about installing Kaspersky on sensitive private sector and government systems, but to contextualize my answer.
On a sort of related note, earlier I said that the American security state has both overt, or covert, links all across the American tech sector.
What that means is that, even if a company holds their principles not compromising their customers or their product, the US government can either get a court order to force it, or they’ll be targeted by something like the Pentagons Signature Reduction program and have sheep dipped employees worked into their organization.
Point is, Kaspersky is one of the few remaining Russian brands and entities still holds a lot of credibility in it’s field, but again, that doesn’t mean the concerns of Western government’s aren’t valid, just that they should be viewed in the proper context.
Read the article. Despite its headline, it goes on to say that the most likely explanation is that the shoddily built truck, that is known for breaking down all the time, probably broke down, as opposed to being remotely disabled.
This is an accounting trick as well, a way to shed profit, and maximize deductions, by having different units within a parent company purchase services from each other.
I realize that my sentence long explainer doesn’t shed any light on how it gets done, but funnily enough, you can ask an LLM for an explainer and I bet it’d give a mostly accurate response.
Edit: Fuck it, I asked an LLM myself and just converted my first sentence into a prompt, by asking what that was called, and how it’s done. Here’s the reply:
This practice is commonly referred to as “transfer pricing.” Transfer pricing involves the pricing of goods, services, and intangible assets that are transferred between related parties, such as a parent company and its subsidiaries.
Transfer pricing can be used to shift profits from one subsidiary to another, often to minimize taxes or maximize deductions. This can be done by setting prices for goods and services that are not at arm’s length, meaning they are not the same prices that would be charged to unrelated parties.
For example, a parent company might have a subsidiary in a low-tax country purchase goods from another subsidiary in a high-tax country at an artificially low price. This would reduce the profits of the high-tax subsidiary and increase the profits of the low-tax subsidiary, resulting in lower overall taxes.
However, it’s worth noting that transfer pricing must be done in accordance with the arm’s length principle, which requires that the prices charged between related parties be the same as those that would be charged to unrelated parties. Many countries have laws and regulations in place to prevent abusive transfer pricing practices and ensure that companies pay their fair share of taxes.
No, he’s a cryptocurrency analyst, with a focus on cryptocurrency related hip-hop artists.
Not some evidence, clear and convincing evidence.
The problem is that the Saudi “government” is essentially comprised of competing factions of slave owning inbred cousins.
So saying the Saudi government was involved isn’t as clear cut as it sounds for the purpose of adjudicating any “punishment”.
Now, if KSA wasn’t the lynchpin of America’s Middle Eastern security apparatus, and viewed as integral to the entire American imperial project, then the US Security State’s response would have likely been much different.
If you’re buying off eBay, I would seriously consider looking into a finding an established and equitable extended warranty program and doing the math.
Also, lookup guides on how to properly inspect and receive large fragile items for delivery. Maybe it won’t matter because it didn’t require a signature and you’re not there to receive it personally, but still, worth knowing when it’s possible to refuse delivery of damaged merchandise, and how to CYA if needed.
The problem isn’t the video feed per se, it’s that the business model of IoT companies, especially cheap IoT companies, include selling off customer data to advertising and other surveillance capital type entities.
So, cheap hardware, lax security at best, and a business model that requires all their devices to have an internet connection to function properly, or access its full feature set.