> I bet companies will release WiFi 8 products even when it's still a draft, just as they did with WiFI 7.
They must. Otherwise it cannot be tested within the labs.
And producing chips before a standard is finalized is usually no problem at all: there are gates within the standardization process where the will be no more changes that are relevant for the silicon.
These 802.11n-draft APs were a singular fuckup regarding this.
You can already make a MAP network, and any modern client will automatically hop between APs pretty fast, based on which one has the strongest signal. There's a common misconception that devices will cling to one AP while better ones are available, which hasn't been true in many years now from my experience.
Infrastructure side handovers are great for load balancing though, for enterprise networks with very high client density.
I have a lot of low bandwidth devices that love to connect to a router further away and congest it. Makes the devices I actually care around run much slower.
The only solution is restarting my network one-by-one so they have a better chance of getting the right device.
Not every problem needs a technical, internet connected solution Some problems are easily solved with "just going out of the door and spending some time" (which, I know, is not a very HN answer, but well)
But how can this "remote-grass-touching-arm" push the "smell" and "tactile" back to the user? Is there an open spec for this? It should certainly be P2P and E2E encrypted. Also "smells" should ensure not to use patented or proprietary names.
Maybe some CSmS, Cascading Smell Sheets? Or TFP, Tactile Feedback Protocol, the one that uses JWT and JSON over HTTP2 and websockets?
Which cost me a fortune once when I plugged my phone into laptop to charge (before free global roaming). Dropbox had been blocked for a week, suddenly a flurry of sms arrived (out of order). I’d spent £250 in 3 minutes.
I feel for you. Why would you allow laptop traffic to be routed through the phone though? At least in iOS plugging the phone for charging or backup does not automatically tether.
my personal pet theory is that china could in principle block whatever they wanted, but, decide instead to block only sometimes and with some random noise thrown in, if only to impose a tax or cost on trying to connect out but to have some plausible deniability on not having it be impossible while still retaining the option of turning the dial to 11 if/when need be.
Thanks to Wireguard and basically 0% battery overhead on Android I always keep it activated. If you don't have a Wireguard endpoint just use Orbot to route it through Tor.
Did that several times using cheap eSIMs while traveling.
Never had a single problem with it (but increased latency because of weird routings around the world).
What I meant was, I don't subscribe to a public VPN service, so routing all my traffic through my wireguard tunnel back home would merely mean it went through a different ISP.
I already use SDNS with Nextguard, and all traffic is https encrypted, and my day to day business on the internet is probably rather boring to the majority of people. Not saying I have nothing to hide, everybody does, but my visits to various news outlets, social media and other sites is probably not all that interesting.
The most interesting data about you comes from your phones constant reporting of cell towers, which can be used to triangulate you, and put a timestamp on where you were, when.
> Never had a single problem with it (but increased latency because of weird routings around the world).
UDP (which WireGuard uses to encapsulate your data) traffic is often de-prioritized. You won't notice it when the network load is low, but it will seriously degrade experience during high load periods.
Wouldn't deprioritizing interfere with regular web traffic these days, given that close to one third of non-bot traffic reported by Cloudflare is over UDP with HTTP/3[0]?
Recently I was looking for solution to have multiple VPN running at the same time, and without work profile I am limited to one. I want to run two (or more) and be able to tell which app uses no VPN, which routes through vpn1, which routes through vpn1, etc. so far it looks like I need multiple profiles, and that requires root, which Google actively discourages.