Well for starters recreate the situation and test out different approaches. Thanks to the detailed analysis that can be attempted.
If I understand right, a good next step would would be with eBPF or some type of proxy ignore the forged RST+ACK at the beginning.
Then it would come testing to see if sending a bunch of ACK packets, perhaps with sequence numbers that would when reconstructed could complete the handshake. Trying to send them alongside the SYN+ACK or even before if it can be predicted. Maybe try sending some packets with sequence id 0 as well to see what happens.
See <Ignoring the Great Firewall of China> in 2006. That won't work if RST/ACK was injected to both sides.
> Then it would come testing to see if sending a bunch of ACK packets, perhaps with sequence numbers that would when reconstructed could complete the handshake. Trying to send them alongside the SYN+ACK or even before if it can be predicted. Maybe try sending some packets with sequence id 0 as well to see what happens.
This is an interesting approach already being utilized, namely TCB desync. But currently most people tend to buy VPN/proxy services rather than studying this.
You clearly haven't tried it or even googled it - because it's impossible to do it unattended. A dialog pops up (and only when unlocked) asking you to confirm the reboot. It's probably because they were worried users might end up in a constant reboot/shutdown cycle, though presumably they could just implement a "if rebooted in the last hour by a script, don't allow it again" rule.
Now we don't yet know which radios exactly these are. But more likely then not, wouldn't these be from the exact same supply chain attack and maybe even come in the same shipment?
According to Routers, they were bought at the same time as the pagers 5 months ago. So I would bet on it being the same supply chain operation that targeted both devices and maybe other devices that were bought at the same time.
There has been no statement or indication that the thousands of people injured were comprised in any significant proportion of civilians. Given that these pagers-- reportedly 5000 of them-- were purchased by Hezbollah directly and videos of their explosions show a minimal blast radius it is premature and, depending on motives, propagandistic to claim that the thousands of people injured were civilians.
Israel's bombing of Gaza made them look like a terrorist organization. I believe the majority of deaths and a significant fraction of injured in this attack are in fact Hezbollah members.
You can't take Lebanon's report on who the injured were at face value. I've not doubt that innocent people were injured by this, but it's not _thousands_ of innocent people.
There has been no statement or indication that the thousands of people injured were comprised in any significant proportion of civilians. Given that these pagers were purchased by Hezbollah directly and videos of their explosions show a minimal blast radius it is premature and, depending on motives, propagandistic to claim that the thousands of people injured were civilians.
Hezbollah like most other similar organisations is not a primarily military organisation even though they are a paramilitary one. The vast majority of the members of Hezbollah have non-military roles of various kinds.
Civilians are shown to be in proximity of these devices when they are exploding. It appears that these devices were all triggered simultaneously, rather than waiting for individual targets to be isolated.
One reason is that Hezbollah is not a purely military organization, and has political, medical and educational arms. Another is that some of the reported casualties are the family of Hezbollah members.
There's no special interface, but you can write an instruction in a system message in the first position. E.g., "Before each function call, explain to the user what you're about to do." It's not super reliable, but the model can do it. Few-shot prompting might help as well.
Decentralized systems, peer to peer, Blockchain, smart contracts, are all important technologies with real use cases. It is not accurate to refer to any of them as simply "crypto" especially in this context.
It's true. Latin America already knows it, USA and Europe are yet to catch up.
Most of crypto is bullshit, but at the very least Bitcoin is a massive, massive use case.
Commercial banks make up most central banks, and if you believe commercial banks aren't grifters or con artists, you've obviously never heard of LIBOR for starters.
As for bad solutions, I'll give you incorrect economic forecasts on inflation and using interest rates as a lever.