SIM card provides hardware-based, simple and secure authentication of subscribers to mobile network operators. Until manufacturers start to embed standardized secure element on all phones, alternative software based solutions (password, etc.) are more complicated and insecure.
You can use laser printer toners to get same effect! They are magnetic as well and might be easier to get.
It's also easy to get better contrast - apply transparent tape to magnetic strip, remove the tape and put it on top of white paper. You can clearly see strips.
I think I see your point, but I wonder... do GS distribute code to their employees? To partner organizations? If so, what are the terms of that distribution? If they are anything other than the original license requires, that's a violation.
The closest environment I got to work with Matrix-like UI but real experience was:
There is board I'm developing on with serial port, and kernel debug prints so much garbage it literally fills the entire screen in less than couple of seconds. It was because of faulty/broken hardware and there is busy loop that keeps retrying to access the device.
I could enter shell commands but I/O lines get mixed in between the verbose kernel debug lines. After some time my eyes synced to the screen scroll rate and I could follow the output from bottom to top to read it (repeatedly run command until I could catch the output correctly).
For the moment, I saw "blonde" in fast scrolling random code :) Anyone else had to work like this?
Everytime u-boot barfed on me or I messed up the serial port I ended up having to scan through screenfulls of ASCII junk scrolling by at full speed to get my commands and results out.
The closest I ever got to -real- blonde/brunette effects was when I was debugging the output from a H264 streamer. I could figure out video resolution and slicing properties from the tcpdump trace scrolling by :)
Not really, depends on definition of "close", i.e. how you measure distance. If closeness means distance in search space, then you're right, but it also could mean local vs global are close in value being optimized, but they are located far from each other in search space.
> Remember most of these do intercept -- they have an SSL CA cert which is trusted by all your business client devices, to do MITM. So, if you pwn the box, you can pwn all the SSL traffic at the target company, too. It's an excellent place to attack.
I really hope this certificate is not installed/trusted by default on major browsers. Can somebody confirm it?
I believe IE and Chrome use the operating systems list of certs. So your corporate IT dept can deploy the trusted certificates pretty easily. Firefox has it's own list of certificates so in theory is less susceptible to these corporate MITM attacks.
RIP Bram Moolenaar