I had to abandon Apple MacOS container because it has so many issues with networking and DNS. I'm looking forward to try it again if they can get it fixed.
There are certainly cases where harmonic distortion is a problem for a device. It’s just that everyone is left guessing, and there’s an overblown fear of devices being harmed.
Sure. It’s just rarely what lay people associate with “sensitive”. Most customers are worried about small electronics with switching mode power supplies that wouldn’t have a problem with just about any power source.
I wouldn’t run some AC motors, old AC clock, ham radio, or many other things on some generators.
The line is open to interoperation and never defined by the manufacturer. It’s blanket liability avoidance that confuses customers.
It's the nature of high fashion brands. a $2000 item may cost $200 to create. The high margin is based on exclusitivity. They would rather destroy it than sell it at $300.
> They would rather destroy it than sell it at $300.
This is exactly it. The actual landed cost is 1/10th of the sales price, and most of the rest of the margin pads the marketing and exclusivity machine. If for instance LV starts selling their $200-landed Neverfull bags at $500 or even $1,000, all the infrastructure sustaining the image becomes unsustainable.
Related note: aren't Louis Vuitton bags being made so crap nowadays that even their own anti-counterfeiting staff can't tell what's real and what's not? I remember hearing of someone who made wallets out of discarded LV bags and got harassed for it by the company.
My personal opinion is that the business model of selling status items - specifically those which only have status because of an artificially limited supply they control - is inherently predatory and should be restricted. Not because I'm the morality police and want to stop people from buying a bag that says "I spent $2000 on a bag", but because there is nothing that stops the company from cost-reducing that to oblivion. If you are going to sell a $2,000 bag, it should be marketed on quality, not a cult.
Agents are excellent for reverse engineering. I was also recently working on a BLE reverse engineering exercise and followed a similar path. I ran into lots of headaches with BLE on my Mac and tabled it.
Author or others who know, did you perform this on Linux? I imagine it lacks the tooling challenges I had with BLE on MacOS.
What sort of tools did it use? I suppose the path mine took may have been a dead end. The Tuya app (I was also using decompiled APK) downloads the BLE definitions on-demand and weren't embedded in the app. It wanted me to capture traffic on a device with the app. I punted but plan to resume with an emulator setup or real device connected with adb.
reply