My AirPod Pros have also worked perfectly on my Linux PCs - just as solid as connecting to an Apple device.
My AirPod Pros have also worked perfectly on my Linux PCs - just as solid as connecting to an Apple device.
Exactly this. When you procure custom hardware, you’re paying (a lot) for the vendor to ensure that each unit meets the specifications you provide. If you validate off the shelf hardware like this, there is no guarantee that another batch of the same sku will also meet your requirements. Imagine training on these controllers then a certain batch of them has wildly different sensitivity.
That’s fair!
Sure, I use a ThunderBolt dock at home, but being docked 100% of the time is probably not normal.
The article says it’s a stock photo that has been edited with AI.
Interesting point about the KVM. To make it transparent the KVM would need to report the model of a real monitor in the display EDID data. Also if you’re monitoring the device, which is almost certainly a laptop, it would be suspicious if it was plugged in to a monitor 100% of the time.
Cameras? Maybe it’s a UK thing, but the only ones I can ever find on eBay are yellowed G3s for silly money.
2FA by SMS you mean? TOTP codes are generated offline
I have no issue with the stealth part given that it can only recognise audio which is already publicly available. If you don’t want people to know what you’re listening to, just don’t play it loudly in public.
This project also wouldn’t be possible if people were aware of it (it would just be gamed and certainly removed).