If you actually sat and read it, you'd see that it's a piece of software that sits on each device connected to the USB switch and detects the USB disconnect/reconnect events which trigger when the USB switch is triggered and uses them to detect that the device should try to take control of the display devices.
I sat and read it and I had the same confusion. I've used a KVM before, but never knew that was some version of a KVM without the "V" called a USB switch. It seems like that peripheral must be less common than both USB hubs and real KVMs.
British copyright law states that books enter the public domain 70 years after the author's death, in this case, 1954. So hopefully in a few years it'll be accessible.
Well, I guess we’ll have to wait until 2024 then. Unless maybe it was published locally in one of those countries like Canada with a shorter term.... but that seems doubtful given the limited availability in public libraries.
I'd be careful trusting anything being piped from Andy Ngo, he has a history of being affiliated with, and giving preferential coverage to some pretty nasty far-right groups [1].
>I'd be careful trusting anything being piped from Andy Ngo
This is supposed to prove that hundreds of videos posted there (many of which are sourced and attributed) are all fake? This sort of ad-hominem nonsense is getting beyond ridiculous.
I've been contributing on and off to the project since it went open source (#4 on that page), it's an interesting experience communicating with blank faces that you can't know or find anything about.
Unrelated: About a year in they sent me an award[0] for continued contributions, but there's a puzzle on it I'm yet to solve; if anyone runs across this I'd appreciate any input!
I've been on a bit of a Michael Lewis binge myself recently, just finishing his book "The Undoing Project" - would definitely recommend if you're even tangentially interested in human psychology. It's a great introduction into why we make errors on a cognitive level and is a great follow-up to some of the concepts discussed in Moneyball.
Not OP, but my dad was in a similar situation to yourself - when I was 12 he bought me an Arduino kit for Christmas and we spent the holidays building projects together. When I was 13-14 he started taking my sister and I to CoderDojos. I'm not saying this will work for every kid and I was nowhere near as advanced as this guy at his age but it has given me a what seems to be a great career path post-university and a good background in open-source software.
But you can bet there will be plenty of people looking at it, and that group of people will also likely include security professionals looking to use it. I'm not sure I can honestly think of a stupider move in this area than to include nefarious code in an open source security auditing tool aimed at the highest and most complex levels of security auditing and used by professionals whose job it is to find and announce these things.
That doesn't mean assume nothing's wrong, but I'm pretty sure this thing will have some pretty talented people looking at it fairly early just for kicks, so of things to worry about, this isn't high on my list.