Maybe it's an excellent experience these days, but every time I've tried Linux on desktop over the past 25 years I get burned. Maybe it works for a while, then your NIC driver gets borked and you spend 2 days trying to get it working again. Or some update goes sideways and you lose the GUI, launching only into a terminal. It's always something. And laptops have even less common hardware than desktops.
On the other hand, every Mac I've used over the past 15 years has been bulletproof. It turns on, it works, it runs *nix. It's an invisible interface to getting work done.
FWIW I have had no issues on a thinkpad for past 10 years running standard linux distros. I think it may come down to a combo of os and particular mb/laptop which is pretty easy to find recommendations.
That's kinda the point of the Mac though, you don't have to get the right distribution or deal with pedantry, you buy, take it home, open it and will run for 8-10 hours of work without charging. No distro issues.
This was known, in the past, but if its relying on zero-days Apple & Google are, adversarially, attempting to keep up with and patch, my assumption would not be that pegasus is, at any time, always able to breach a fully-updated iPhone. Rather, its a situation where maybe there are periods of a few months at a time where they have a working exploit, until Apple discovers it and patches it, repeat indefinitely.
It's always a game of cat and mouse, but NSO had a quarter billion USD in annual revenue in 2020. They are clearly providing highly effective spyware to governments around the world. It wouldn't surprise me if they have that many zero day, zero click exploits that they can always get in to a phone. We're talking nation state espionage here... they probably have insiders at Apple and Google who introduce subtle unnoticeable bugs in core OS stacks.
The nso group is on the entity list, so no western govt is using it. And it was never used to gain access to devices that they already had physical control over.
You need to have compliance certifications or no one will use this. Think along the lines of SOC2, HIPAA, willingness to sign BAAs, etc. The hardest part of this company is going to be sales. You're not selling to small businesses who will pop in a credit card number -- this is an offering for enterprises with annual agreements and longer sales cycles.
Also, consider supporting CCPA for California businesses.
Actually, we’re mostly targeting small companies (10–50 people) that need guidance to avoid big fines but can’t afford the bigger, full-featured compliance tools.
Do you think there’s really no room for something like this in the market without having all the compliance certifications first?
There might be. You need to talk to your market and find out. I work at larger companies, so I can’t speak to startup culture right now. There’s no way I would personally sign off on giving access to all of our company data to a small company with no certifications, especially in an AI world where you might leak all of our data into public training models if it’s done wrong.
Nanit is horrible spyware. Do not buy their products.
If you have a router that lets you inspect data flowing out, you'll be astonished at what your little Nanit cam exfiltrates from your home network. Even if you don't pay for their subscription service, they still attempt to exfil all of the video footage caught on your camera to their servers. You can block it and it will still work, but you shouldn't have to do that in the first place if you don't pay for their cloud service.
This page cannot be scrolled in Safari or Firefox.
Devs -- stop hijacking native scrolling functionality. Why? You had one shot to sell me on this product. I can't see the page, so I can't consider it for purchase. That's a lost sale.
I've used Ruby off and on since the hype train started with DHH's early videos showing how easily you can make a blog in Rails. Oof, that was published 20 years ago! I wouldn't use it for anything beyond simple shell scripts these days. You're better off with Go for back-end work.
reply