

Samsung had a smart watch with a curved screen and a 3g modem in 2014 (the original Gear S). I guess it didn’t work out.
Samsung had a smart watch with a curved screen and a 3g modem in 2014 (the original Gear S). I guess it didn’t work out.
They can’t read so it won’t have much of an effect on their votes
I’d go mad too if someone tried to train me on AI created data all the time…
I don’t think you need an optimal spanning tree. Proxying messages is basically just how Usenet works. You peer with a small number of other servers each party forwards messages in groups the other party is interested in.
As someone who used to run a Usenet server (20 years ago), I don’t think it’s a better system. The extra hops add a lot of questions related to moderation, filtering, censorship, trust, responsibility for forwarded content, and so on.
My understanding is that if an instance suddenly dies, all the federated instances that subscribe to its communities will still have the text content because they store copies locally. So knowledge should not just go away. Media is a different story though.
I think new posts/comments in those communities would then not federate at all anymore since the host instance would not acknowledge them. So the communities turn into isolated local ones.
If the host instance comes back and the communities are re-created, they’ll be empty on the host instance but I think other instances won’t delete the old content unless explicitly requested.
In 2004 I was still running a Usenet server. Online games were run by the community too. I spent so much time on MUDs.
It seems like now we are in this cycle where someone builds something shinier and fancier, it briefly becomes the next best thing, and then they find out it can’t make money (or just survive) unless it becomes significantly worse, and then the next best thing appears. But because of all the steps back there is little real progress. Lemmy too is, functionally, not that different from Usenet. It has pictures and votes and is generally more modern. But what I see highlighted in contrast to reddit is that it’s distributed. Like Usenet. It’s not supposed to be a breakthrough but after reddit it feels like one.
Also ich seh das irgendwie nicht.
Hier ist die Präsentation (in Spanisch): https://www.documentcloud.org/documents/25554812-2025-rootedcon-bluetoothtools/
Die reden da über undokumentierte HCI-Kommandos. HCI ist das womit die Software auf dem Gerät mit dem BT-Controller kommuniziert. Um da ne Backdoor draus zu machen, muss man erstmal Software schreiben die HCI über eine andere Schnittstelle zugänglich macht die remote zugänglich ist.
Das einzige was ich im Moment sehen kann ist dass z.B. wenn ein Gerät schon angreifbar ist, und man z.B. MITM gegen den Update-Prozess machen und damit manipulierte Firmware einschleusen kann, dann kann diese Firmware mehr mit BT machen als die Forscher vorher gedacht haben? Aber ich bin mir auch nicht sicher was die dann genau gedacht haben was die Hardware die z.B. hinter dem Flipper Zero steht machen kann. Das ist halt software radio, die software kann alles.
Allerdings sind die Slides auch nicht super informativ. Liest sich mehr wie Werbung für ihr neues Tool. Besonders viele Details sind da nicht, außer halt eine Tabelle mit den undokumentierten opcodes die sie gefunden haben. Vielleicht fehlt da noch was entscheidendes.