Tuya Local and Protocol 3.5 support

I have been a longtime user of localtuya and tried to configure a recently purchased triple USB tuya plug that looks like that below. localtuya has been suggested by most of the tutorials online and is one of the most popular add-ons. The device name showing up on the SmartLife app is 3CH Wifi ...

When does Windows sleep?

I have always wondered about a somewhat inconsistent behaviour in how Windows decides when the computer is inactive, and to turn off the screen and subsequently sleep. As an example, if I have a 2 hour YouTube video playing in the browser, the screen will never turn off and the computer will ...

Integrating Kasm with MS Azure Internal OIDC

Recently, I faced issues integrating Kasm with Microsoft Azure Internal OIDC due to outdated documentation. After some trial and error, I got it to work. Here's the list of inaccuracies in the documentation. Step 17 is no longer required. sid will be automatically included in the token. You ...

Export Controls on Software

In the context of software, export control has a fairly encompassing definition and restricts the "disclosure of source code to foreign nationals", even if the disclosure occurs domestically, even if no money changes hands, and also if the distribution occurs over the Internet [1], the ...

Territoriality: Internet Crime

I do believe that Barlow's statement still holds some weight today and that states "are not welcome" in cyberspace [1]. In cyberspace, it is companies that jealously guard their jurisdiction and sovereignty as they battle for market share, user retention, all the while collecting massive troves ...

Volume of Digital Evidence

Doctorow states that the most important commodity in today's economy is attention [1]. Each person only has 24 hours in a day to send messages, surf the net, watch video and shop online. Hence, even though the size of hard drives has increased 100 fold from 10GB in 1999 to 1TB in 2013 [2], we ...

Centralization of Digital Evidence

Internet traffic today is highly asymmetric. The top 5 social media sites account for 99% market share of global social media traffic [1]. Crimes ranging from blackmail to phishing scams to bomb threats are largely occurring on the same few social messaging apps and social network sites. Most ...

AI model licensing

There are two main categories of open-source licenses. Firstly, permissive licenses such as Apache 2.0 and MIT allow the license holder significant freedom to use the code even as part of proprietary software that the license holder is developing [1]. Restrictive licenses such as GPL family of ...