We’ll be on the air tonight at 19:00 EDT. Listen live on 99.5 FM in New York or at https://wbai.org/playernew.html
What was up on #Codeberg in May? Read about it in the Monthly Letter in our Blog: https://blog.codeberg.org/monthly-report-may-2021-preparing-the-new-server.html
Want to have more insights and actively support our mission? Consider joining Codeberg at https://join.codeberg.org today!
Thank you for supporting our mission!
“our customers are able to stitch historical anonymous data to 95% of their converted users–this is even in the last few weeks after all the Apple device and browser privacy updates.”
Fuck these people.
From my experience building on the technology I can confidently say: Voice assistants are the epitomy of Service as a Software Substitute (SaaSS)!
There's zero reason you need to offload voice recognition computation onto the cloud, it may not be trivial task but any modest consumer hardware is more than capable enough!
You don't need a supercomputer, and I don't think debugging false positives justifies keeping recordings of private communication (though I understand the temptation).
3D Print An Entire PC Case https://hackaday.com/2021/06/12/3d-print-an-entire-pc-case/
Original tweet : https://twitter.com/hackaday/status/1403849759929012229
Check out our latest episode featuring a hacker's perspective on Twitter reopening verifications, Trump abandoning blogging, CFAA prosecutions, and more!
A New Type Of COVID-19 Vaccine Could Debut Soon https://www.npr.org/sections/health-shots/2021/06/06/1003328413/new-type-of-covid-vaccine-could-debut-soon
Did you know: the account holder of a family plan has access to all the numbers all the phone lines in the plan have called or texted, including if someone in the plan is calling a domestic violence hotline. The Safe Connections Act tries to change that. https://www.eff.org/deeplinks/2021/06/safe-connections-act-would-make-it-easier-escape-domestic-violence
To actually process a basic block it first checks if there's actually any PHI if the caller told us to process them.
Unless we're handling cycles, it'll consider recursively inserting the loop header into place.
It'll optionally iterate over the PHI instructions to recursively compute a "value number" (hash?) for the expressions they reference.
It updates the edges' EXECUTABLE flags. It iterates over instructions to choose other branches to examine & lookup what can replace this instruction.
`SSA_NAMES`, assignments, conditions, & calls are handled specially. There's plenty of debugging info written for the GCC devs. If it's made any changes there may be per-instruction tidyup for it to perform, possibly defered to a later pass.
Failing to find another instruction to replace it `pass_fre` will add it's parameters to the collections of instructions which may replace later instructions.
6/6 Fin, for now. Next: initial Value Range Propagation
Yes, FRP wasn't very straightforward!
#DEFCON Group in New Jersey. We meet at Sub Culture, Jersey City once a month to work on hardware/software projects! CFP: info (at) defcon201 [dot] org
This service is offered by alarig.
Beer, privacy and free software lovers. Join us!