michelb76
About
- Username
- michelb76
- Joined
- Visits
- 113
- Last Active
- Roles
- member
- Points
- 1,620
- Badges
- 1
- Posts
- 774
Reactions
-
Jon Stewart opens up about Apple interference in his show
-
Apple Ring rumors & research - what you need to know about Apple's next wearable
Marvin said:AppleInsider said:Samsung has made it If they could get a wristband to work like the LEAP Motion sensor, that could track the entire hand movement (0:50):
The sensor would point from the wrist towards the hand. One for each wrist would be usable in AR when hands are out of view.
https://www.amazon.com/Ultraleap-Leap-Motion-Controller-2023-Linux/dp/B0C8B5K5RX
At 7:45 the person plays a violin with the hand movements. This is similar to the hand tracking on the Vision Pro, which will be able to do the same. Maybe there would be too much occlusion on the wrist to track the hand.
Being able to get hand rotation and some kind of selector would offer quite a lot of input options, a ring might be able to offer enough but full hand tracking would be more useful. Smart rings from other companies are being used for health tracking rather than input control. -
Apple's big WWDC 2024 announcement may be an AI App Store
-
macOS Sonoma update fixes USB hubs, Java crashes, and more
pulseimages said:Does the update fix the Mac Optimized Storage bug? -
Apple Silicon vulnerability leaks encryption keys, and can't be patched easily
VictorMortimer said:twolf2919 said:While definitely a vulnerability, I wish the author had highlighted how difficult it is to exploit. Just telling me that the attack "must also be used on the same chip cluster as the cryptographic target app in order to function, and both must use the efficiency cores or the performance cores at the same time" doesn't really tell me that. It sure sounds very esoteric - I'm not running a cluster on my MacBook (cluster of one?) nor do I really know what a 'cryptographic target app' means.
As most attacks, this requires you - at the very least - to download and run an app of unknown origin. Don't do that.So, stick to open source only?Because the reality is that this can be hidden just about anywhere in a closed source app, and your precious app store can't protect you.