tl;dr: One peer generates a self-signed certificate and sends the fingerprint of that over the signalling channel; the other connects to it as a "client".
The resulting DTLS keying material is subsequently used for SRTP encryption (for media) and SCTP over DTLS (for the data channel, which is presumably what's being used here).
apart from that: the word "mark" comes from a root for "boundary" or "border", and really it doesn't need to be about that; we're all in this together.
The Wasm Constant Time proposal was just moved to inactive 4 days ago[0].
From what I can tell the bulk of the work for it was done in 2018[1], but it needs updating to consider SIMD, and for legwork to be done on moving it along as a proper spec extension.
Until someone picks up this valuable work and lands this much-needed feature in Wasm, we're extremely vulnerable to timing attacks in all Wasm crypto.
Well, yeah, or else they'll release software with memory leaks, which could become a dependency of some big project and bring down some important things and have real effects on some other people.
Or, yeah, because if my child can access streaming without a child lock, they may not recover from what they see.
Looks like we should protect each other as much as we can, using UI!
An LLM would have to be two-faced in a sense to surreptitiously mess with code alone and be normal otherwise.
It's interesting and a headline worthy result, but I think the research they were doing where they accidentally found that line of questioning is slightly more interesting: does an LLM trained on a behavior have self-awareness of that behavior. https://x.com/betleyjan/status/1894481241136607412
These are a bit mythical, finding one for sale is no small feat.
I guess adding memory to some cards is a matter of completely reworking the PCB, not just swapping DRAM chips. From what I can find it has been done, both chip swaps and PCB reworks, it's just not easy to buy.
Software support is of course another consideration.