I know that I'll be downvoted to hell , but I would love to integrate it with OCR and an LLM , such that uploading the garage treatment summary would auto-create the necessary records.
... Which means that if the hacker is near you when you park - there is a time period where the fob isn't masked by the bag, because it is coming out of the ignition, and voulaa - you can record the key's pong of the car's ping, retransmit, and get in. Correct?
Time for the US to bite the bullet and do that with SSN cards.It's already being used as an ID, even if the inventor didn't intend for it to happen.
Just put up a picture and a smart chip on it.
I would think that a valid digital contract would involve 2 cryptographic digital signatures. Anything less than that is just a glorified, easily spoofed, text document
Scam emails are deliberately littered with spelling mistakes, a comprehensible scam email is a bad scam email - because the addition of spelling mistakes guarantees that the gullible and scamable folks responds to it.
Do you want to scam the general populace w/o a human reading response emails? There's phishing for that.
OK, I've read the wiki entry but I still don't understand what KVM is, or why it's needed.
The last time I visited a data center - every server rack came with a laptop-esque looking control unit. What problem does KVM comes to solve? What does this invention improve upon a traditional KVM?
But cracking ed25519, or RSA , is something that state actors can't do without massive resources... What am I missing here?Even if I reverse engineer Linux, I can't know the decryption keys for my encrypted data....
Are you saying that HDCP is not "Secured" but "Jumbled up"? If tomorrow the source code for it get released - then "The jig is up"?
I know that I'll be downvoted to hell , but I would love to integrate it with OCR and an LLM , such that uploading the garage treatment summary would auto-create the necessary records.