No more headphone jack -- Why I keep an older phone that still has a hexacore processor & 4Gb RAM -- all you need baby.

OnePlus is working on a followup to the OnePlus 6, the OnePlus 6T. The company's latest smartphone should launch sometime in October, and until then we're getting a slow, continual drip of information on the device. The latest news is not so great. The company has revealed that it's dumping the headphone jack on the OnePlus 6T.


Technology Racism -- it's a thing.

This is as bad as structural violence/structural racism. Welcome to the CHAOTIC world of Earth. Capitalism has infected the world.

What can a viral video of a “racist” soap dispenser tell you about the world of technology? A surprising amount, apparently. 

Chukwuemeka Afigbo, a Nigerian man who works in tech, tweeted a short video of a “racist” automatic soap dispenser that appears to dish out soap to a white person’s hand but not a black person’s. As you can tell by its 130,000+ retweets and the number of laughing emoji reactions it received, it can be seen simply as a funny viral video. 

But as Chukwuemeka points out, this highlights a bigger issue. The no-touch soap dispenser most likely uses some kind of light sensor to detect when a hand is beneath the contraption. Apparently, a dark-skinned hand wasn’t light enough to register on the sensor. This simple problem would have been avoided if it had been tested on a variety of skin tones. That, of course, requires people working in the industry from a variety of backgrounds.

There are plenty more examples of this. Soap dispensers, for one, seem to be particularly bad at dealing with different skin tones. In the past, Flickr and Google were both forced to apologize when their automatic image labeling systems were tagging photos of black people with “ape” and “gorilla". 


dd to save a life?

Now computer world is throwing me for a loop. I want to create a bootable thumb drive. With TRK let's leave it. -- Yes i've used this before. Yes, I've done all these methods before. Yes, I've used the .ISO even, or alternative methods.

1. sudo dd if=trinity-rescue-kit.3.4-build-372.bin of=/dev/sda bs=4M

2. I used YUMI, I dd'd the file. I zipped/un-zipped -- I keep getting ONE error, "No configuration file found" removing file entry.

I've tried previous versions to the ISO. No luck... :(

Should move the .ISO onto my thumb drive. (After verifying partitions with lsblk)

lsblk == display block size information -- Basically FDISK without the disk partitions. It's all in block sizes.

Why can I not, Sure, it moves the .bin/.iso file onto the thumb drive. -- But the thumb drive is not bootable as it should be?

Why doesn't that make sense, you see.... all I'm doing is copying files from an extracted ISO/IMG/BIN file

moving them onto a thumb drive and the thumb drive should be bootable. -- BUT WHY, do these computers not recognize it as an operating system... I do not compute.

Yes, I've tried USB boot creators -- SAME result. == NOT FUN.

But then if i do the .BIN file, it creates correct files. just no boot??

This is ALWAYS WHERE YUMI, comes into play::::


Tech companies make last-minute effort to avoid new China tariffs

Originial Article:

Four major tech companies have sent a last minute letter to the Office of the US Trade Representative asking to be exempted from a possible new round of tariffs on $200 billion worth of Chinese imports.
The companies, Dell, (DVMT) Cisco (CSCO), Juniper Networks (JNPR)and Hewlett Packard Enterprise (HPE), are worried the tariffs will increase the costs of their networking equipment, damaging the companies' bottom lines and leading to possible US job losses.

They say the increase in prices would negatively impact customers, small businesses, internet service providers, and data centers. The tariffs would hinder innovations important to the US government, such as cloud computing and the rollout of 5G networks, according to the letter.


Chrome-based Browsers Have Loopholes that Enable Hackers to Infiltrate Wifi Routers

Refer to original article:

Surecloud, a cybersecurity firm has released a report about a Google Chrome, Chromium, Opera, Vivaldi and other Blink-engine based browsers’ unpatched flaw that enables cybercriminals to penetrate the home wifi networks of unsuspecting users. Eliot Thompson, a Surecloud researcher, upon checking Chrome’s behavior as found a flaw on how the browser implements its saved password feature and the user’s bad habit of using the same password across many services, including the password for the Wi-Fi router’s configuration page. Google-based browsers have an inherent flaw of offering users to save passwords for sites, which include wi-fi configuration page, which is normally using an unencrypted http:// URL.

The password manager that came with Chrome saves not only passwords but also other information submitted in a web form. This can include anything from a name, address, birthdate and any personally identifiable information as demanded by a sign-up form. At the moment the home routers affected by the flaw include known mainstream brands like Belkin, Asus, and Netgear. Routers from other vendors are still being checked for the existence of the vulnerability to the Google Chrome exploit, but the common understanding is any router that uses plain http unencrypted wi-fi configuration page is affected. There is no way to change the behavior unless the router vendor issues a new firmware that will change the wi-fi configuration page to a TLS-encrypted URL.