Starship is about 80% the width of Falcon Heavy - but all the way around and practically all the way up!
Starship is about 80% the width of Falcon Heavy - but all the way around and practically all the way up!
RIP B1087.
That is fun, I didn’t know that was a thing. I imagine that roll-overs are more common than submersion in water, but even so, that doesn’t sound like a great trade-off. Even in a crash, being able to quickly jump out the window is good — especially if the vehicle is on fire.
The front ones don’t seem to be hidden, but yeah - if they’re not meant to be used regularly, people won’t remember them in an emergency. I guess the rear ones are hidden because they probably bypass child-locks.
I don’t know how child-locks work on mechanical door latches. If the vehicle locks when in motion and the child-locks are on I don’t think there are emergency releases on most vehicles? The only ways out would be to get into the front cabin, break the windows, or find the internal boot release.
There’s a panel that can be popped out to open the hood with a 12V power supply: https://www.tesla.com/ownersmanual/modely/en_us/GUID-34181E3A-B4A7-4658-906A-38C6647B5664.html
beneath the seat
For the toddler to use?
There is a mechanical door release if you’re trapped inside. To get in from outside obviously needs the vehicle to unlock, so it has to be jump started.
Even if there was some kind of back-up mechanical lock I can’t see anyone carrying around a key only for this specific eventuality. A glass breaker key-ring might be the best option — along with understanding how to use these emergency features in case you need them. A glass breaker might also save you in a fire or ending up underwater.
Wherefore art thou Gnomeo?
I can see that, but surely there wouldn’t be much difference matching the first 4bits (0x2XXX, 0xfXXX) vs the first 16 (0x0001)?
0:: is presumably all for loopback-type stuff, but I don’t see a reason not to use 1:: through 1fff:: and they would be much easier to type/remember/validate for public DNS servers which are needed before name resolution is available.
Why start at 0x2001 though? Why not 0x0001? Then we could have addresses like 1:1:1::1 or 1:2:3::4.
2606:4700:4700::1111
Hmm, maybe Google is easier:
2001:4860:4860::8888
Quad9 is 2620:fe::fe or 2620:fe::9
I don’t understand why they can’t get better addresses than that. Like surely 1::1 would be valid?
Edit: So IANA only control addresses 2001:: and up and there are quite a few IETF reservations within that. I don’t know why they picked such a high number to start at. Everything else seems IETF reserved with a little space allocated for special purposes (link-local, multicast, etc.).
Kenya believe it‽
It’s just looking in a sqlite file and listing the jpeg directory. The only extra step is running icacls
to let the user read the files.
not caring
enough
So… how does the user actually ®ecall™ anything? Do they have to ask M$ Co-pilot™ AI to get it from The Azu®e™ Cloud? Because I’m pretty sure a hacker could do that just as easily.
Right but if I use a hammer to prove the lock I just bought is useless at protecting my shed, I’m not committing theft. This was a few lines of Python to look at data that is explicitly stored for the user to look at later.
It requires full disk encryption doesn’t it? If someone already has access to your account then they can access this data the same way you can. The new issue here is that this silos a load of private data in one easy to grab location. Users would have to set up the filters perfectly to prevent recall capturing anything more sensitive than what’s already accessible to their account. This is in a world where many users are probably storing their passwords in a Word document on the desktop.
Who is this 4chan guy anyway?
Fulfills the AI quota 👍
Their solution is to let users filter out websites in compatible browsers. This lets them blame the user for not marking sensitive websites as such. I don’t know if native applications can also be filtered.
Of course they also filter out precious DRM protected content. You wouldn’t steal a series of JPEGs.
How will they filter it out? If they just don’t mirror anything with ‘forbidden’ terms, we can poison repos to prevent them being mirrored. If they try to tamper with the repo histories then they’ll end up breaking a load of stuff that relies on consistent git hashes.