Advertisement · 728 × 90
#
Hashtag
#interest
Advertisement · 728 × 90
Preview
So would a U.S. default really be that bad? Yes — And here's why As the debt ceiling debate comes down to the wire, here is a look at some of the potential consequences if the U.S. defaults on its debt for the first time in history.

One theory I heard is we’re being looted then #default
😬
the #interest rate on the country's debt would go up because the #U.S. would be seen as riskier The shock to #markets could spark a #global #financialCrisis No #money for #schools, #roads, #SocialSecurity checks

www.npr.org/2023/05/24/1...

0 0 0 0
Preview
Mal Leyland is slowly losing his memory. But there's someone he'll never forget Adventurer and filmmaker Mal Leyland, of Ask the Leyland Brothers fame, shares his private health battle. But the TV legend is determined to retrace the cross-country trip that made him famous 60 years ago.   #human #interest #alzheimer #s #dementia #biographical #films

Adventurer and filmmaker Mal Leyland, of Ask the Leyland Brothers fame, shares his private health battle. But the TV legend is determined to retrace the cross-country trip that made him famous 60 years ago.   #human #interest #alzheimer #s #dementia #biographical #films

1 0 0 0
Preview
We asked how fuel prices are affecting you — this is what you told us From crop farmers to wildlife rescuers, here are some of the stories ABC readers told us about how the fuel crisis is impacting them. #petrol #prices #oil #gas #war #human #interest #small #businesses #farmers

From crop farmers to wildlife rescuers, here are some of the stories ABC readers told us about how the fuel crisis is impacting them. #petrol #prices #oil #gas #war #human #interest #small #businesses #farmers

0 0 0 0
Preview
Consider yourself a trivia nut? Have a crack at this quiz We know you've come here looking for trivia glory but you're unlikely to find any today. #comedy #human #interest #television

We know you've come here looking for trivia glory but you're unlikely to find any today. #comedy #human #interest #television

0 0 0 0
Post image

Astronaut Was Eating Dinner in Space When He Suddenly Couldn’t Speak. He Says Doctors Still Don't Know What Happened “It was completely out of the blue," said Mike Fincke, who ended up ...

#Human #Interest #News #Human #Interest

Origin | Interest | Match

0 0 0 0
Post image

‘Not Even a Horse Saves You’: Kentucky Man Arrested for DUI While Riding to Bowling Green Liquor Store Horseback DUI?! The post ‘Not Even a Horse Saves You’: Kentucky Man Arrested for DUI W...

#Human #Interest #human #interest #Kentucky

Origin | Interest | Match

0 0 0 0
Post image

New York Business Student Accuses Classmate of Stealing Her Notes and Project: ‘Students Need to Take Accountability Too’ Students need to take accountability The post New York Business Student...

#Human #Interest #human #interest #New #York

Origin | Interest | Match

0 0 0 0
Post image

California ‘Bevcart Girl’ Shares How Workplace Discrimination Destroyed Her Experience, ‘Sooooo how much you suing for Sis’ That doesn't sound good The post California ‘Bevcart Girl...

#Human #Interest #California #human #interest

Origin | Interest | Match

0 0 0 0
Video

Evidence #nouscomplex #science #islam #reflection #people #intelligence #corruption #interest #shorts #reels #stories #foryou #fy

0 0 0 0
Preview
Young Queensland runner breaks national records at state titles A rising Queensland runner is drawing national attention after dominating three events — but said his dream sport lies elsewhere. #athletics #community #society #human #interest

A rising Queensland runner is drawing national attention after dominating three events — but said his dream sport lies elsewhere. #athletics #community #society #human #interest

0 0 0 0
TV New Update - ABC The National News Break with Ralph Neil (ABC, 1984)
TV New Update - ABC The National News Break with Ralph Neil (ABC, 1984) YouTube video by Video History Snippets

youtu.be/Wn276fuyY3w?...

It seems like only yesterday

#Defence
#Strikes
#ANZUS
#Corruption
#Interest%

0 0 0 0
US.Rates.Daily.png

US.Rates.Daily.png

10Y #Treasury is at 4.42%, up from 4.33% last week. How are shorter-term interest rates contributing to the change in the yield curve? #interest #econsky https://tinyurl.com/m7pdyyyf

1 0 0 0
Video

Evidence #nouscomplex #science #islam #reflection #people #intelligence #corruption #interest #shorts #reels #stories #foryou #fy

0 0 0 0
Post image

A Massive 40-Foot Whale Washed Ashore in New York City as Experts Track Rising Strandings Along the East Coast Authorities urge the public to keep their distance as investigators assess the scene

#Wild #Animals #Animals #Human #Interest

Origin | Interest | Match

0 0 0 0
Post image

Good Intentions Go Wrong: Massachusetts Influencer’s Chili’s Outing With Homeless Group Ends in Chaos, ‘This Is Just Disrespectful’ All hell broke loose The post Good Intentions Go Wrong: M...

#Human #Interest #human #interest #Massachusetts

Origin | Interest | Match

0 0 0 0
Post image

1 Person Dies, 4 Firefighters Injured in New York City Apartment Blaze. Woman Remembers Hearing Man Scream, 'I'm Trapped' “He recognized my voice, which was very heartbreaking,” sai...

#Real #People #Tragedy #Real #People #Human #Interest

Origin | Interest | Match

0 0 0 0
Preview
'There will be tax reform', but treasurer says no decision yet on capital gains Treasurer Jim Chalmers commits to tax reform in his upcoming budget, but adds that no decision has yet been taken as to whether capital gains tax will be part of those changes. #economy #recession #interest #rates #inflation #budget #federal #government #tax

Treasurer Jim Chalmers commits to tax reform in his upcoming budget, but adds that no decision has yet been taken as to whether capital gains tax will be part of those changes. #economy #recession #interest #rates #inflation #budget #federal #government #tax

1 0 0 0
Preview
Conflict reshapes ancient festival for Iranian Australians As Iranian Australians try to celebrate Persian New Year, news of the conflict in the Middle East is always front of mind. #community #multicultural #festivals #multiculturalism #human #interest #unrest #conflict #war

As Iranian Australians try to celebrate Persian New Year, news of the conflict in the Middle East is always front of mind. #community #multicultural #festivals #multiculturalism #human #interest #unrest #conflict #war

0 0 0 0

Just do something because you have an interest in it.

#interest #do #activity

0 0 0 0

Take a bit of time each day to invest in something you're interested in.

#time #day #invest #interest

0 0 0 0
Preview
Weekly news quiz: Jet fuel shortages, headbutting whales and Donald Trump's social faux pas It's been a big week in the news. Did you catch these stories? #human #interest

It's been a big week in the news. Did you catch these stories? #human #interest

0 0 0 0
Post image

Louisville to Settle with Wedding Photographer for $800K After She Claimed Ordinance to Photograph Same-Sex Couples Violated Rights Chelsea Nelson filed the lawsuit against the Louisville-Jefferson...

#Real #People #Weddings #Real #People #Human #Interest

Origin | Interest | Match

0 0 0 0
Post image

John Cena Shuts Down New York Influencer Who Randomly Sang to Him: ‘I’m Not Buying What You’re Selling’ Cena wasn't having any of it. The post John Cena Shuts Down New York Influencer W...

#Human #Interest #human #interest #New #York

Origin | Interest | Match

0 0 0 0
Post image

Woman Slams Black ICE Agents in Washington D.C: ‘My Morals and Values Aren’t For Sale’ What would you do in their place? The post Woman Slams Black ICE Agents in Washington D.C: ‘My Morals ...

#Human #Interest #Ice #Washington #D.C

Origin | Interest | Match

0 0 0 0
Preview
The Most Secure, Modern Computer Might Be A Mac The Linux world is currently seeing an explosion in new users, thanks in large part to Microsoft turning its Windows operating system into the most intrusive piece of spyware in modern computing. For those who value privacy and security, Linux has long been the safe haven where there’s reasonable certainty that the operating system itself isn’t harvesting user data or otherwise snooping where it shouldn’t be. Yet even after solving the OS problem, a deeper issue remains: the hardware itself. Since around 2008, virtually every Intel and AMD processor has included coprocessors running closed-source code known as the Intel Management Engine (IME) or AMD Platform Security Processor (PSP). M1 MacBook Air, now with more freedom These components operate entirely outside the user’s and operating system’s control. They are given privileged access to memory, storage, and networking and can retain that access even when the CPU is not running, creating systemic vulnerabilities that cannot be fully mitigated by software alone. One practical approach to minimizing exposure to opaque management subsystems like the IME or PSP is to use platforms that do not use x86 hardware in the first place. Perhaps surprisingly, the ARM-based Apple M1 and M2 computers offer a compelling option, providing a more constrained and clearly defined trust model for Linux users who prioritize privacy and security. Before getting into why Apple Silicon can be appealing for those with this concern, we first need to address the elephant in the room: Apple’s proprietary, closed-source operating system. Luckily, the Asahi Linux project has done most of the heavy lifting for those with certain Apple Silicon machines who want to go more open-source. In fact, Asahi is one of the easiest Linux installs to perform today even when compared to beginner-friendly distributions like Mint or Fedora, provided you are using fully supported M1 or M2 machines rather than attempting an install on newer, less-supported models. The installer runs as a script within macOS, eliminating the need to image a USB stick. Once the script is executed, the user simply follows the prompts, restarts the computer, and boots into the new Linux environment. Privacy-conscious users may also want to take a few optional steps, such as verifying the Asahi checksum and encrypting the installation with LUKS but these steps are not too challenging for experienced users. ## Black Boxes Changing the operating system on modern computers is the easy part, though. The hard part is determining exactly how much trust should be placed in the underlying hardware and firmware of any given system, and then deciding what to do to make improvements. This is where Apple Silicon starts to make a compelling case compared to modern x86 machines. Rather than consolidating a wide range of low-level functionality into a highly privileged black box like the IME or PSP, Apple splits these responsibilities more narrowly, with components like the Secure Enclave focusing on specific security functions instead of being given broad system access. Like many modern systems, Apple computers include a dedicated security coprocessor alongside the main CPU, known as the Secure Enclave Processor (SEP). It runs a minimal, hardened operating system called sepOS and is isolated from the rest of the system. Its primary roles include securely storing encryption keys, handling sensitive authentication data, and performing cryptographic operations. This separation helps ensure that even if the main operating system is compromised, secrets managed by the SEP remain protected. ## The Chain of Trust To boot an Apple Silicon computer, a “chain of trust” is followed in a series of steps, each of which verifies the previous step. This is outlined in more detail in Apple’s documentation, but starts with an immutable boot ROM embedded in the system-on-chip during manufacturing. It first verifies early boot stages, including the low-level bootloader and iBoot, which in turn authenticate and verify the operating system kernel and system image before completing the boot process. If any of these verification steps fail, the system halts booting to prevent unauthorized or compromised code from executing. Perhaps obvious at this point is that Apple doesn’t sign Asahi Linux images. But rather than allowing unrestricted execution like many PCs, or fully locking down the device like a smartphone, Apple’s approach takes a middle way. They rely on another critical piece of “security hardware” required to authorize that third-party OS: a human user. The Asahi Linux documentation discusses this in depth, but Apple’s secure boot system allows the owner of the computer to explicitly authorize additional operating systems by creating a custom boot policy within the user-approved trust chain. In practice, this means that the integrity of the boot process is still enforced, but the user ultimately decides what is trusted. If a boot component is modified outside of this trust chain, the system will refuse to execute it. In contrast to this system, where secure boot is enforced by default and only relaxed through explicit user action, x86 systems can treat these protections as optional. A motivated x86 user can achieve a comparable level of security, but they must assemble and maintain it themselves, as well as figure it out in the first place. ## Reducing the Attack Surface The limited scope of Apple’s Secure Enclave gives it a much smaller attack surface compared to something like the Intel Management Engine. As mentioned before, the IME combines a wider range of functionality, including features designed for low-level remote system management. This broader scope increases its complexity and, by extension, its attack surface which has led to several high-profile vulnerabilities. Apple’s Secure Enclave, by contrast, is designed with a much narrower focus. That’s not to say it’s a perfect, invulnerable system since it’s also a closed-source black box, but its limited responsibilities inherently reduce that attack surface. It’s also worth mentioning that there are a few other options for those who insist on x86 hardware or who refuse to trust Apple even in the most minimal amount, but who still consider the IME and its equivalents as unacceptable security risks. Some hardware manufacturers like NovaCustom and even Dell have given users the option of disabling the IME (although this doesn’t remove it entirely), and some eight and ninth generation Intel machines can have their management engines partially disabled by the user as well. In fact these are the computers that my own servers are based on for this reason alone. Going even further, it is possible to get a 2018-era Thinkpad to run the open-source libreboot firmware. However, libreboot installations can become extremely cumbersome, and even then you’ll be left with a computer that lacks the performance-per-watt and GPU capabilities of even the lowest-tier M1 machines. In my opinion, this compromise of placing a kernel of trust in Apple is the lesser evil for most people in most situations, at least until libreboot is able to support more modern machines and/or until the libreboot installation process is able to be streamlined. I’ll also note here that Apple is far from a perfect company. Their walled garden approach is inherently anti-consumer, and they’ve rightly taken some criticism for inflating hardware costs, deliberately making their computers difficult to repair, enforcing arbitrary divisions between different classes of products to encourage users to buy more devices, and maintaining a monopolistic and increasingly toxic app store. But buying an M1 or M2 machine on the used market won’t directly give Apple any money, and beyond running the Asahi installer script doesn’t require interacting with any Apple software or their ecosystem in any way, beyond the initial installation. I’ve argued in the past that older Apple computers make excellent Linux machines for these reasons as well, and since the M1 and M2 machines eliminate the IME risk of these older computers they’re an even better proposition, even without considering the massive performance gains possible. Ultimately, though, the best choice of hardware depends on one’s threat model and priorities. If the goal is to minimize exposure to IME/PSP-level risks while retaining semi-modern performance, an M1/M2 Mac with Asahi Linux is one of the best options available today. But if fully open hardware is non-negotiable, you’ll need to accept older or less powerful machines… for now.

The Most Secure, Modern Computer Might Be A Mac The Linux world is currently seeing an explosion in new users, thanks in large part to Microsoft turning its Windows operating system into the most i...

#Featured #how-to #Interest #Linux #Hacks

Origin | Interest | Match

1 0 0 0
Preview
The Most Secure, Modern Computer Might Be A Mac The Linux world is currently seeing an explosion in new users, thanks in large part to Microsoft turning its Windows operating system into the most intrusive piece of spyware in modern computing. For those who value privacy and security, Linux has long been the safe haven where there’s reasonable certainty that the operating system itself isn’t harvesting user data or otherwise snooping where it shouldn’t be. Yet even after solving the OS problem, a deeper issue remains: the hardware itself. Since around 2008, virtually every Intel and AMD processor has included coprocessors running closed-source code known as the Intel Management Engine (IME) or AMD Platform Security Processor (PSP). M1 MacBook Air, now with more freedom These components operate entirely outside the user’s and operating system’s control. They are given privileged access to memory, storage, and networking and can retain that access even when the CPU is not running, creating systemic vulnerabilities that cannot be fully mitigated by software alone. One practical approach to minimizing exposure to opaque management subsystems like the IME or PSP is to use platforms that do not use x86 hardware in the first place. Perhaps surprisingly, the ARM-based Apple M1 and M2 computers offer a compelling option, providing a more constrained and clearly defined trust model for Linux users who prioritize privacy and security. Before getting into why Apple Silicon can be appealing for those with this concern, we first need to address the elephant in the room: Apple’s proprietary, closed-source operating system. Luckily, the Asahi Linux project has done most of the heavy lifting for those with certain Apple Silicon machines who want to go more open-source. In fact, Asahi is one of the easiest Linux installs to perform today even when compared to beginner-friendly distributions like Mint or Fedora, provided you are using fully supported M1 or M2 machines rather than attempting an install on newer, less-supported models. The installer runs as a script within macOS, eliminating the need to image a USB stick. Once the script is executed, the user simply follows the prompts, restarts the computer, and boots into the new Linux environment. Privacy-conscious users may also want to take a few optional steps, such as verifying the Asahi checksum and encrypting the installation with LUKS but these steps are not too challenging for experienced users. ## Black Boxes Changing the operating system on modern computers is the easy part, though. The hard part is determining exactly how much trust should be placed in the underlying hardware and firmware of any given system, and then deciding what to do to make improvements. This is where Apple Silicon starts to make a compelling case compared to modern x86 machines. Rather than consolidating a wide range of low-level functionality into a highly privileged black box like the IME or PSP, Apple splits these responsibilities more narrowly, with components like the Secure Enclave focusing on specific security functions instead of being given broad system access. Like many modern systems, Apple computers include a dedicated security coprocessor alongside the main CPU, known as the Secure Enclave Processor (SEP). It runs a minimal, hardened operating system called sepOS and is isolated from the rest of the system. Its primary roles include securely storing encryption keys, handling sensitive authentication data, and performing cryptographic operations. This separation helps ensure that even if the main operating system is compromised, secrets managed by the SEP remain protected. ## The Chain of Trust To boot an Apple Silicon computer, a “chain of trust” is followed in a series of steps, each of which verifies the previous step. This is outlined in more detail in Apple’s documentation, but starts with an immutable boot ROM embedded in the system-on-chip during manufacturing. It first verifies early boot stages, including the low-level bootloader and iBoot, which in turn authenticate and verify the operating system kernel and system image before completing the boot process. If any of these verification steps fail, the system halts booting to prevent unauthorized or compromised code from executing. Perhaps obvious at this point is that Apple doesn’t sign Asahi Linux images. But rather than allowing unrestricted execution like many PCs, or fully locking down the device like a smartphone, Apple’s approach takes a middle way. They rely on another critical piece of “security hardware” required to authorize that third-party OS: a human user. The Asahi Linux documentation discusses this in depth, but Apple’s secure boot system allows the owner of the computer to explicitly authorize additional operating systems by creating a custom boot policy within the user-approved trust chain. In practice, this means that the integrity of the boot process is still enforced, but the user ultimately decides what is trusted. If a boot component is modified outside of this trust chain, the system will refuse to execute it. In contrast to this system, where secure boot is enforced by default and only relaxed through explicit user action, x86 systems can treat these protections as optional. A motivated x86 user can achieve a comparable level of security, but they must assemble and maintain it themselves, as well as figure it out in the first place. ## Reducing the Attack Surface The limited scope of Apple’s Secure Enclave gives it a much smaller attack surface compared to something like the Intel Management Engine. As mentioned before, the IME combines a wider range of functionality, including features designed for low-level remote system management. This broader scope increases its complexity and, by extension, its attack surface which has led to several high-profile vulnerabilities. Apple’s Secure Enclave, by contrast, is designed with a much narrower focus. That’s not to say it’s a perfect, invulnerable system since it’s also a closed-source black box, but its limited responsibilities inherently reduce that attack surface. It’s also worth mentioning that there are a few other options for those who insist on x86 hardware or who refuse to trust Apple even in the most minimal amount, but who still consider the IME and its equivalents as unacceptable security risks. Some hardware manufacturers like NovaCustom and even Dell have given users the option of disabling the IME (although this doesn’t remove it entirely), and some eight and ninth generation Intel machines can have their management engines partially disabled by the user as well. In fact these are the computers that my own servers are based on for this reason alone. Going even further, it is possible to get a 2018-era Thinkpad to run the open-source libreboot firmware. However, libreboot installations can become extremely cumbersome, and even then you’ll be left with a computer that lacks the performance-per-watt and GPU capabilities of even the lowest-tier M1 machines. In my opinion, this compromise of placing a kernel of trust in Apple is the lesser evil for most people in most situations, at least until libreboot is able to support more modern machines and/or until the libreboot installation process is able to be streamlined. I’ll also note here that Apple is far from a perfect company. Their walled garden approach is inherently anti-consumer, and they’ve rightly taken some criticism for inflating hardware costs, deliberately making their computers difficult to repair, enforcing arbitrary divisions between different classes of products to encourage users to buy more devices, and maintaining a monopolistic and increasingly toxic app store. But buying an M1 or M2 machine on the used market won’t directly give Apple any money, and beyond running the Asahi installer script doesn’t require interacting with any Apple software or their ecosystem in any way, beyond the initial installation. I’ve argued in the past that older Apple computers make excellent Linux machines for these reasons as well, and since the M1 and M2 machines eliminate the IME risk of these older computers they’re an even better proposition, even without considering the massive performance gains possible. Ultimately, though, the best choice of hardware depends on one’s threat model and priorities. If the goal is to minimize exposure to IME/PSP-level risks while retaining semi-modern performance, an M1/M2 Mac with Asahi Linux is one of the best options available today. But if fully open hardware is non-negotiable, you’ll need to accept older or less powerful machines… for now.

The Most Secure, Modern Computer Might Be A Mac The Linux world is currently seeing an explosion in new users, thanks in large part to Microsoft turning its Windows operating system into the most i...

#Featured #how-to #Interest #Linux #Hacks

Origin | Interest | Match

0 0 0 0
Post image

Happy Birthday, Gloria Steinem! Look Back at the Trailblazer's Life in Photos as She Turns 92 Today One of the defining voices of feminism in the 1970s and beyond has accomplished so much in he...

#Human #Interest #Celebrity #Birthdays #Celebrity

Origin | Interest | Match

1 0 0 0
Preview
Some Drivers Will Qualify for a New Tax Break on Car Payments Cars will need to meet certain criteria to qualify

Some Drivers Will Qualify for a New Tax Break on Car Payments

www.insidehook.com/autos/driver...

#News #USNews #Politics #USPolitics #Taxes #Cars #Autos #Automobiles #Drivers #Taxpayers #CarPayment #Interest #TaxBreak #TaxTip #TaxTime

0 0 0 0