a network of tunnels and sensors is easier to defend than a open space exposed position where drones can see you from miles away, I guess that makes tunnels better for defense
Given that we have bunker busters that will travel beyond the horizon at hypersonic speeds and bust 200 feet of reinforced concrete...
I don't think any fixed installation is particularly easy to defend?
Also, I'll grant that a drone can see you from miles away, but don't you think any one of a large and growing number of satellites can spot your massive earthworks from tens and hundreds of miles away for the months or years it takes you to construct?
We did run internal benchmarks and experiments, but we focused on measuring our own performance rather than doing side-by-side comparisons with other tools. The goal was to validate stability, speed, and resource usage in real scenarios, not to create a public comparison that could be misleading or depend on many external factors. We’re planning to share our methodology and raw numbers so people can evaluate the results themselves and run their own comparisons if they want.
Jail time is not always the entire punishment, especially on the enlightened continent, where jail time is used sparingly. Keeping the conviction on record is a thing, because consecutive convictions often carry come with higher punishment. So depending on a crime cathegory, there is X years after which the record no longer counts, but it's not 0.
Push-to-Sync. We observed 8 apps employ a push-to-sync strat-
egy to prevent privacy leakage to Google via FCM. In this mitigation
strategy, apps send an empty (or almost empty) push notification
to FCM. Some apps, such as Signal, send a push notification with
no data (aside from the fields that Google sets; see Figure 4). Other
apps may send an identifier (including, in some cases, a phone num-
ber). This push notification tells the app to query the app server
for data, the data is retrieved securely by the app, and then a push
notification is populated on the client side with the unencrypted
data. In these cases, the only metadata that FCM receives is that the
user received some message or messages, and when that push noti-
fication was issued. Achieving this requires sending an additional
network request to the app server to fetch the data and keeping
track of identifiers used to correlate the push notification received
on the user device with the message on the app server.
Maybe I’m mis-interpreting what you mean, but without a notification when a message is sent, what would you correlate a message-received notification with?
reply