Pretty much everybody in this thread who is laughing at Amazon’s drones is thinking of drones as they are right now. But Amazon is not using drones because it’s a good idea now. They’re using drones now so they already have the experience and the setup when inevitable technical progress happens.
The drones might never work out or they might eventually work out, but this is exactly how Amazon got so big in the first place. They started selling books online when a lot of people still weren’t sure whether that could work and they started selling cloud computing almost ten years before anyone else thought to do that.
Amazon is not quite as dominant in Japan. Rakuten is still alive.
Comparing to macOS is actually impossible because fde can’t be turned off on Macs at all. Macs (and iPhones etc.) handle encryption of internal storage transparently in hardware at pretty much no overhead and without the CPU even having access to the key. You can only choose whether a login is required for the Secure Enclave hardware to be able to access the key.
On other platforms it’s pretty much a hardware question too. PC vendors and hard disk vendors could do the same thing Apple is doing regardless of whether the OS is Windows or Linux or whatever. How fast the OS based encryption is only matters on hardware that doesn’t have this functionality.
The T2 chip is only in Intel Macs. ARM Macs have the Secure Enclave too but it’s part of the main SoC, not a dedicated chip.
If it’s a Mac then it’s not the CPU that’s doing the encryption for the internal drive. Macs have separate hardware for that, the CPU can’t even get the key.
Macs have encryption in hardware in the dma channel for their built-in drives (Intel Macs with T2 and all ARM Macs), so the overhead is negligible on the internal ssd. Macs actually don’t even have unencrypted internal drives anymore. The filevault toggle only affects whether the volume encryption key stored in the secure enclave is itself encrypted or not.
Older Macs and external drives are a different story of course.
If you need python 3 there’s also graalvm but its python support is still “experimental”.
I don’t think you need an optimal spanning tree. Proxying messages is basically just how Usenet works. You peer with a small number of other servers each party forwards messages in groups the other party is interested in.
As someone who used to run a Usenet server (20 years ago), I don’t think it’s a better system. The extra hops add a lot of questions related to moderation, filtering, censorship, trust, responsibility for forwarded content, and so on.
It’s not related to Windows or Linux, but as the article notes, Apple devices that use UEFI are not vulnerable (and current ones don’t use it anymore and therefore aren’t vulnerable either), so I guess that’s where the “Windows or Linux” comes from.