• 0 Posts
  • 20 Comments
Joined 1 year ago
cake
Cake day: July 3rd, 2023

help-circle



  • one isn’t supposed to move the camera

    Depends on the effect you want. You can do lots of cool/cheesy tricks by moving the camera, like putting the sky from a different place into a different photo, or seeing stars inside a person silhouette. That’s all double exposure, regardless if you like or consider it “proper technique”.


  • Its double exposure.

    Since the sky is so bright, if you take a photo capturing the city buildings color, the sky ends up almost white due to it being so white. If you expose for the sky colors instead, you can see the full gamut of colors in this sunset, but the buildings would end up very dark (this is how we end with those iconic western film scenes or dark ground with red sky).

    You can take a double exposure to combine both so you have a higher range of light. There are many techniques for it and phones do it automatically but can be done in any camera, even film cameras. However if you fuck up or theres movement (slighty different angle) between the two takes, you can end up with things ghosting out.

    It can be used to create lots of tricks: https://www.ericjamesphoto.com/blog/2016/2/double-exposures-on-film

    In the 19th century they used it to “photograph ghosts” (spiritualism was in vogue at the time): https://en.wikipedia.org/wiki/Spirit_photography













  • Yes and no. It’s an escalations issue. Even with administrator access, you are not supposed[note1] to be allowed to install drivers with invalid signature, which supposedly haven an even high chain of trust (although this really iffy unless you are using secureboot as well but that’s another discussion).

    That said, when the attacker already has admin privileges you are so far in the compromised chain that the kernel driver is an issue, but you are most likely completely fucked anyways.

    This just makes your vulnerability state to be the same as in linux, where your drivers arent required to be signed in the first place, for example.

    [note 1]: There’s a caveat, with admin acess you can disable driver signatures entirely, using bcdedit, this is called test signing and leaves a visible watermark at all times with “Test signing enabled”, therefore the user can already see that the computer is compromised. Its mostly useful for devs (or attacking people who dont give a fuck).



  • Linux Kernel is kind of a bad example since its one of the examples of project scaling with many people from many companies. Even if you want to go with its inception, it came from Unix which already had many people. Of course, its also one of the best examples of actual leadership, proper technical people management, which is something very hard to come by. Its also a great example of how to divide your design and make it scalable, so people are working on different parts totally independent on each other.

    That’s all actual, proper, work, not whatever crappy slide presentation passes as leadership on many places.