The protocol contains two categories of commands, "system" and "direct". System commands vaguely relate to "operating system" functionality, and direct commands vaguely relate to "actually operating a robot". In general, this protocol also seems to specifically not allow performing arbitrary operations and badness such as accessing the firmware or getting native code execution outside of the VM. It appears to be designed to give friendly access to only the NXT's virtual filesystem and bytecode interpreter.
The case involved a Sunrise red-light camera citation issued to a registered vehicle owner after automated cameras captured a vehicle entering an intersection against a red signal. The defendant argued the statute unconstitutionally requires the registered owner to prove they were not driving — instead of requiring the government to prove who was behind the wheel.
。关于这个话题,新收录的资料提供了深入分析
The data shown above seems very personal but doesn’t actually expose any sensitive information. For example, disclosing your current location, your home address, or stores and places you frequently visits is sensitive and potentially dangerous. Even looking at the map of my movement data, you won’t get any more information that what most people have in their public Twitter bio.
Read the full story at The Verge.