You mean Sweden and Denmark, not Scandinavia. And both have different ideas about joining the Eurozone. Norway isn't part of the EU. Finland is using the Euro.
Finland is Nordic but not Scandinavia. Because Norway is not an EU member, discussing a euro opt out doesn't make sense. Thus, OP is accurate in stating that Scandinavia got a Euro opt-out.
Known as Maryland's “Queen City,” Cumberland was an early gateway to the West. Today, it is a bustling arts center and popular stopover for cyclists using the trail network between Pittsburgh and Washington, D.C.
> If you store any kind of data about a visitor to make their life more convenient, is that tracking? Shopping carts? Notification preferences? etc.
If it is crucial to provide the service or the service is explicitely requested by the user (i'd argue a shopping cart is), I think you don't need consent (see Article 5 of Directive 2002/58/EC).
> But then the governments will legislate against citizens usage of the technology.
No, given some exceptions (think dictators trying), that's not going to happen, right? At that point it's not a technological issue. You're talking about the right to be cryptical in everyday speech.
Edit: or, in a different approach, they'd have to forbid (private) use of (some) algorithms. Again, that sounds like you'll have bigger issues then, no?
There is a growing minority of people who think this is the way the world is going. Trends in legislation in this area within Western democracies seems to indicate that privacy is being consistently attacked in the name of protecting the wider public.
I heard some expert recently saying he backs this idea but thinks it should be 9th. Otherwise it’s in the middle school and that creates pressure for 7th and 6th graders. Makes sense to me to have the transition be middle school graduation.
That graph does not have 0 as the starting point, which makes the so called spike look more dramatic. Try to enlarge the view by selecting a much longer period of time.
They are also a major proprietary hassle, whereas with Bluetooth and a Logitech K380 keyboard, which is cheap, readily available everywhere and reliable as heck I can switch between three machines at the press of a button.
I use that and an M720 Bluetooth mouse to switch between two work machines and a personal one on the same desktop, which is something you just can't do with the Logitech Logi Bolt dongle - even if you buy multiple ones.
Also, I've been using this setup with Macs for ages (that's one of the machines above), and never ran into the same problem.
Pros and cons? With the Logitech (and others) dongles you can also just plug them into a KVM and swap that way which isn't an option with Bluetooth, the device specifically has to support multiple devices.
But to use a KVM you have to have some form of commonality between devices (one of mine only has USB-C ports), plus you have to have all the cabling. And most consumer KVMs only take 2 outputs.
I'll take Bluetooth _any day_ over having another mess of cables, another box, and what boils down to less ease of use.
I use a USB C hub with my KVM for my laptop. The hub takes the KVM USB A cable and the DP cable. One cable connects the laptop and I can switch PCs with a touch of a single button. I don't like switching inputs on my monitor manually through the OSD. You can get KVMs that do 3 or 4 computers with multiple monitors, although granted they do cost more. Again, pros and cons! I find it pretty slick though.
I added a small udev rule to send a "change input" dcc command to the monitor when my USB switch connects or disconnects. The monitor has a USB-C input, and I connect the USB ports it provides to my USB switch.
Cheaper than a KVM, though it only works if the computer that has the rules is turned on (that monitor accepts commands from inactive sources).
If somebody knows a ready-made "reverse dock" (USB-C dock connector -> USB-PD out + DP in + USB device), I'm all ears!
Entirely reasonable stance. Previous story[0] about keyboard “security”: 8/10 tested were vulnerable to sniffing or injection. A handy summary table someone put together
Protocol Sniffing Injection
Plexgear Yes Yes
Rapoo Yes Yes
Logitech No Yes
Corsair Yes Yes
iiglo Yes Yes
Exibel Yes Yes
Razer No No
And what about side channels? It should be relatively easy to link timing to each key pressed, for instance, if not outright extracting the encryption key from emitted signal power fluctuations.
These approaches are not just theoretical, they have been shown to work. And that's assuming the protocol itself is not vulnerable and has been implemented correctly. Moreover, I tend to use my keyboards a long time, making it likely that a new attack becomes possible over its lifetime.
Personal question, feel free not to answer: what is your occupation that someone would find so interesting as to drag over a truckload of RF equipment near your location to try to home in on your 2.4Ghz keyboard, which operates in one of the most saturated frequency ranges known to modern man? :)