Ryan Graves
👤 PersonAppearances Over Time
Podcast Appearances
Yeah, very little. It would be very specific to his actual responsibilities, his engineering work.
Yeah, very little. It would be very specific to his actual responsibilities, his engineering work.
Yeah, very little. It would be very specific to his actual responsibilities, his engineering work.
And he seems nervous. Well, he should be. He may truly believe that. Spilling the beans.
And he seems nervous. Well, he should be. He may truly believe that. Spilling the beans.
And he seems nervous. Well, he should be. He may truly believe that. Spilling the beans.
What's on the plate then after weapons of mass destruction?
What's on the plate then after weapons of mass destruction?
What's on the plate then after weapons of mass destruction?
All runs on an ECU. My understanding is that this is something China's been looking forward to. So what I mean by that is that they have not just been working on this technology in order to break our encryption now.
All runs on an ECU. My understanding is that this is something China's been looking forward to. So what I mean by that is that they have not just been working on this technology in order to break our encryption now.
All runs on an ECU. My understanding is that this is something China's been looking forward to. So what I mean by that is that they have not just been working on this technology in order to break our encryption now.
but have been storing our encrypted data from in the past such that when they do have that breakthrough, they have a lot of data to be able to utilize it on, not just what's happening now.
but have been storing our encrypted data from in the past such that when they do have that breakthrough, they have a lot of data to be able to utilize it on, not just what's happening now.
but have been storing our encrypted data from in the past such that when they do have that breakthrough, they have a lot of data to be able to utilize it on, not just what's happening now.
I think they typically refer to that as a man-in-the-middle attack. So you think you're connecting to the regular Wi-Fi, but you're actually connecting to the adversary's Wi-Fi, sending your data through there, and then they send that to the original box that you thought you were communicating with. And so they get all the information.
I think they typically refer to that as a man-in-the-middle attack. So you think you're connecting to the regular Wi-Fi, but you're actually connecting to the adversary's Wi-Fi, sending your data through there, and then they send that to the original box that you thought you were communicating with. And so they get all the information.