Nowhere in that entire case does anyone allege that the FBI was regularly being sent entire copies of the hard drive contents of best buy customers.
The FBI merely taught workers how to identify and report CSAM. There is nothing illegal about that.
EFF only sued because their FOIA request for info about their training process was denied, and after the FBI argued why they shouldn't grant the request, EFF agreed and backed down.
Not only did the EFF agree to dismiss the case, their blog post claim of a supposed Fourth Amendment violation was never even argued in any of their filings at all.
In my opinion, to construe a simple disagreement/misunderstanding over a FOIA request denial (which was proven as legal and justified) as "If you took your laptop to Best Buy for repairs, the FBI got a copy of your hard drive contents"... is patently and demonstrably false, and does not make any sense whatsoever.
So you think in this case the EFF was wrong? It seems that way, but I'm not sure I fully understand what you meant. Why wouldn't the training process be public?
Another thing is that while perhaps entire copies of customers' hard drives weren't sent to the FBI, the Best Buy repair staff dug through the contents of people's hard drives. If I have a software issue with my OS (or whatever the repairs were about), I wouldn't expect the repair staff to look at my photos. Obviously, is CP was set as the wallpaper or something, you can't miss it, but why is it OK to look into random folders looking for suspicious files?
You’re making the same mistake the EFF’s post wants you to make.
Employees were trained on how to identify and respond to CSAM. The training material was not released based on the FOIA request.
That doesn’t imply that the employees were poking around above and beyond where they had to look to do their job, and it doesn’t imply that full copies of your hard drive are being copied to the FBI.
Presumably for interviews - specifically STAR[0] format. And no, "just living and thinking" isn't preparing for this. Not everyone thinks in that manner.
So I would have to hover over a link, press a key combo that might conflict with my OS, wait for a full page load in the background, then see what a small-scale LLM decides the link is about along with a thumbnail? Who asked for this, and how does it keep me "organized" and "focused" vs just clicking on the link?
"the AI that generates the key points may miss context from the webpage and make mistakes" You don't say...
I appreciate this, especially for Richard Steenbergen's traceroute presentation which I need to dig into. There's a 2020 version of the presentation if anyone is interested, since the Scribd/Slideshare version in the article is from 2014-ish.
Edit: yes, I fully agree that traceroute is flawed, it's only ever going to give you an incomplete or even misleading piece of the picture and you shouldn't take what you see as gospel. That said, it has its uses especially for networks that you control and to let you know where to maybe start digging - which is all that any tool does.
As long as you're the only one doing the troubleshooting, sure. FTA:
> The example given is that a handful of users running MTR (do not get me started on this bastard program) can actually hit this rate limit. This is an outstanding example because I have seen something similar in practice.
> Consider what that would look like, and how common it would be: If you have a NOC full of people who think they know what they're doing, but don't, that only enhances the probability that everyone is trying to troubleshoot on their own instead of doing a screenshare and coordinating their efforts - thus, you have six guys running MTR to the same IP.
I've had Verizon's "Home Internet" service for a year or so in middle America. The 4G and 5G signal strength roughly match and aside from a few initial reboot issues - resolved by firmware updates - it's had rock solid speed. I just ran a few tests from librespeed.org:
╔═════════════╦════════════════╦══════════╦════════╦════════╦══════════╦═════════╗
║ Location ║ Provider ║ Protocol ║ Ping ║ Jitter ║ Down ║ Up ║
╠═════════════╬════════════════╬══════════╬════════╬════════╬══════════╬═════════╣
║ Chicago ║ Sharktech ║ IPv4 ║ 60 ms ║ 15 ms ║ 408 Mbps ║ 23 Mbps ║
║ Atlanta ║ Cloudiver ║ IPv6 ║ 67 ms ║ 8 ms ║ 311 Mbps ║ 23 Mbps ║
║ Amsterdam ║ "Rust backend" ║ IPv4 ║ 169 ms ║ 260 ms ║ 68 Mbps ║ 20 Mbps ║
║ Nuremberg ║ Hetzner ║ IPv6 ║ 155 ms ║ 125 ms ║ 132 Mbps ║ 20 Mbps ║
║ Los Angeles ║ Sharktech ║ IPv4 ║ 86 ms ║ 15 ms ║ 373 Mbps ║ 21 Mbps ║
║ Serbia ║ SOX ║ IPv6 ║ 188 ms ║ 29 ms ║ 173 Mbps ║ 17 Mbps ║
║ Tokyo ║ A573 ║ IPv4 ║ 183 ms ║ 72 ms ║ 156 Mbps ║ 22 Mbps ║
╚═════════════╩════════════════╩══════════╩════════╩════════╩══════════╩═════════╝
I wouldn't say it's "decrepit", but maybe I'm just lucky.
A casualty of acquisitions, I think. Linux Academy got bought by A Cloud Guru, who then got bought by Vista Equity along with Pluralsight. I think the material lives there now [0].
Packt does have "Linux Service Management Made Easy with systemd" as of Feb 2022, but I've not yet read it.
https://www.foxnews.com/tech/the-fbi-paid-geek-squad-employe...
https://www.eff.org/cases/fbi-geek-squad-informants-foia-sui...
https://www.washingtonpost.com/local/public-safety/if-a-best...