591: FOSS does what Nintendont
Coder Radio - Un pódcast de Jupiter Broadcasting - Miercoles
Categorías:
We get frustrated with Nintendo. Then, dig into the 30-year-old backdoor that was recently exploited and the hard lesson we should learn from it. Then, we'll break down some "hot tips" that promise to make you the next DevRel star.Sponsored By:Annual Membership - Jupiter Party: Put your support on auto-pilot and get one month for free!Support Coder RadioLinks:💥 Gets Sats Quick and Easy with Strike — Strike is a lightning-powered app that lets you quickly and cheaply grab sats in over 100 countries. Easily integrates with Fountain.fm. Setup your Strike account, and you have one of the world's best ways to buy sats.🇨🇦 Bitcoin Well — Enable your independence with the fastest and safest way to buy bitcoin in Canada and the USA. Focused on Bitcoin excellence, enabling true financial independence 🥇📻 Boost with Fountain.FM — Boost from Fountain.FM's website and keep your current Podcast app. Or kick the tires on the Podcasting 2.0 revolution and try out Fountain.FM the app! 🚀Ryujinx Switch Emulator Project Shuts Down Under Nintendo Pressure — Open source Nintendo Switch emulator Ryujinx has thrown in the towel under pressure from Nintendo. Lead developer 'gdkchan' was reportedly contacted by the gaming giant on Monday. He was given the opportunity to stop working on the project and shut down everything under his control, presumably to avoid further action. The project's repo on GitHub has already been deleted. 'Modded Hardware' Defendant Denies Nintendo's Copyright Claims in Court — The alleged operator of Modded Hardware has filed an answer to Nintendo's copyright complaint, denying any wrongdoing. The defendant, who represents himself in court, counters with a long list of affirmative defenses including fair use. The case will now move forward to the discovery process. Meanwhile, the Modded Hardware site has gone private. The 30-year-old internet backdoor law that came back to bite — The wiretap systems, as mandated under a 30-year-old U.S. federal law, are some of the most sensitive in a telecom or internet provider’s network, typically granting a select few employees nearly unfettered access to information about their customers, including their internet traffic and browsing histories. Meredith Whittaker on Masto — Case in point: there's no way to build a backdoor that only the "good guys" can use. Chinese hackers access US telecom firms, worrying national security officials — US investigators believe the hackers potentially accessed wiretap warrant requests, two of the sources said, but officials are still working to determine what information the hackers may have obtained. US broadband and internet providers AT&T, Verizon and Lumen are among the targets, the sources said. Exclusive | U.S. Wiretap Systems Targeted in China-Linked Hack - WSJ — AT&T and Verizon are among the broadband providers that were breachedUnlocking the ‘aha’ moment: Developer relations for startups — Developer relations (DevRel) can be a cornerstone of product adoption and growth for early-stage companies, but too often early-stage companies end up focusing on the wrong things. The linchpin for success lies in how quickly developers reach their first "aha" momentMermaid | Diagramming and charting tool — JavaScript based diagramming and charting tool that renders Markdown-inspired text definitions to create and modify diagrams dynamically.Integrations | MermaidmacOS Window Manager | BentoBox 🍱 — A window manager that boosts productivity by snapping windows into predefined zones, like a Japanese bento box organizing meals.