BMW and Toyota have famously used bio-derived insulation reported to be like catnip for rodents.
The bio-oil plasticizers also migrate out more quickly in thermal cycling than the old dead dinosaurs approach. Hilariously, when I asked my mechanic about getting an M5, he laughed and explained that the radiator components are known to turn brittle and crack after 5-6 years because of this.
(I don't envy automotive folks. The stuff they have to deal with is next level.)
Last time I had to call AAA to jump my car, the guy opened the hood very carefully and told me he’d had three rats jump out of engines at him that day, presumably because of the “soy wires.”
Nothing can beat the 600 Mercedes for cachet though. Look at the list of owners: Idi Amin, Ceauşescu, Saddam Hussein, F.W.de Klerk, Papa Doc, Mugabe, Brezhnev, Tito, Mao, Kim Il-Sung, Ferdinand Marcos, Deng Xiaoping, Mobutu, Jean-Bédel Bokassa, Mubarak, Berlusconi, Pablo Escobar, Jeremy Clarkson, nothing will ever come close to that.
I'm not sure where else you can get a half TB of 800GB/s memory for < $10k. (Though that's the M3 Ultra, don't know about the M5). Is there something competitive in the nvidia ecosystem?
I wasn't aware that M3 Ultra offered a half terabyte of unified memory, but an RTX5090 has double that bandwidth and that's before we even get into B200 (~8TB/s).
You could get x1 M3 Ultra w/ 512gb of unified ram for the price of x2 RTX 5090 totaling 64gb of vram not including the cost of a rig capable of utilizing x2 RTX 5090.
I don't think I can recommend the Mac Studio for AI inference until the M5 comes out. And even then, it remains to be seen how fast those GPUs are or if we even get an Ultra chip at all.
Is local jamming or removing their antennas a viable strategy? Seems like it could be easier to just make them unable to phone home, rather than trying to surgically rip out the bundle of hardware and software responsible for it while leaving everything else intact.
Vehicles differ. Disconnecting the antenna is easiest in some. Removing a fuse is sufficient in some. Disconnecting the relevant module is not surgical in some. Some nag if the antenna is disconnected.
Oh man, my grandmother was like this with finding four leaf clovers. She would just find them constantly, all the time, on command, or maybe while standing around having a conversation. Her description of it was "it's like they're just jumping up and waving at me" which somewhat fits with the author's description of motion. Never heard of anyone else like this though, neat to see others in the comments.
What does the GPD Win 4 do in this scenario? Is there a step w/ Agent Organizer that decides if a task can go to a smaller model on the Win 4 vs a larger model on your Mac?
The point here is that the doc you linked is a year and a half old, this (if real) is much newer. Security is a constant arms race between attackers and defenders, nothing is static so updates of this nature are always welcome.
Also fair! I think "leaker" is just bristly to me in this context, when there's a nearly identical version of it just hanging out for folk to find. But also just a hope that some folk might poke around documentcloud for similar documents lying around. Lots of newsworthy gems in there just waiting to be picked up and this's a good example.
> Or will the iPhone have a multi-hour update where it decrypts its entire iCloud archive on the client-side, and then reuploads it without encryption?
More likely that the phone just sends the keys to Apple in that case
But that passphrase you saved is an additional key, in case you lose all your Apple devices for example. You can tell it isn’t required for your phone to decrypt data because you don’t have to type it in to access your data, or even migrate to a new phone.
And if they allow rescue contacts in case you lose the password and you can decrypt the data through their account, there is a chance they also keep a key for themselves, just in case.
If you got sensitive data, learn to encrypt it yourself. That is the ONLY way to make sure. If you trust another company to do the encryption at rest for you, that is your own fault.
If I understand correctly it doesn’t matter where the user’s profile is hosted, the point is the user has a store of data that can be accessed by multiple apps via the AT protocol, only naming convention separates one app’s data from another’s within a given user’s profile.