by mandatory on 8/11/24, 8:29 PM with 50 comments
by krackers on 8/11/24, 9:00 PM
This is the second time I've read about an iPhone OCR rack https://findthatmeme.com/blog/2023/01/08/image-stacks-and-ip...
Is this still state of the art in terms of local OCR?
by epakai on 8/11/24, 10:15 PM
ARM Apple Silicon Developer Transition Kit: https://www.youtube.com/watch?v=reQq8fx4D0Q iPod Touch dev board: https://www.youtube.com/watch?v=qLCt6oHPTQM
The PCB repair technique for the DTK is pretty cool on its own.
by JKCalhoun on 8/11/24, 8:59 PM
by miki123211 on 8/12/24, 12:14 AM
They can essentially guarantee that the disk encryption key will only be released from the security module if the computer is running a fully-trusted and signed OS. Even if you take the drive out of the machine, the data on that drive is completely useless to you.
Incidentally, this is also what makes short PINs secure; the TPM contents are unreadable, even to a skilled attacker, so if the TPM is guaranteeed to wipe itself after 10 tries, even a 4-digit PIN is secure enough.
by noident on 8/12/24, 12:31 AM
by grishka on 8/12/24, 12:10 AM
> Bryant again reported his findings to Apple and returned the Mac Mini to them.
Why the hell did he do that?! It's, like, the worst thing one can possibly do with these kinds of devices. Just publish stuff that doesn't have anyone's personal data in it. That'll make the world better in the end.
by rbanffy on 8/11/24, 10:04 PM
Or, at least, catalogued, scanned, and photographed.
by JKCalhoun on 8/11/24, 9:05 PM
by jamesy0ung on 8/11/24, 9:44 PM
by The_SamminAter on 8/12/24, 2:40 AM
by kotaKat on 8/12/24, 2:35 PM
I've seen everything from Amazon's palm-scanners to a tactical LTE base station once used by NIST to all sorts of Zebras full of fun software.
by kome on 8/12/24, 1:24 AM
by jfdjkfdhjds on 8/11/24, 9:52 PM
I think the only piece I'd pay to read is how they negotiated with spotify.