You’re right, we can make terrorism a crime. That will stop them.
You’re right, we can make terrorism a crime. That will stop them.
Oh my god that drives me nuts. I haven’t saved it so why is it still here?
I don’t have admin privileges and can’t install Firefox on my work computer but I can install Firefox on a thumb drive and then run it from the thumb drive because IT admins are idiots
I’m not convinced anyone actually likes vim. They are just use it to be edgy.
Nobody uses notepad the way Microsoft thinks people use notepad.
Somebody already did that but it wasn’t with chat GPT and honestly the docs were fine.
It didn’t do that thing that a lot of humans do when writing documentation which is just declare that something is true without explaining why it is true. So you end up in random PHP like land, when things just work like that okay.
This question was already answered 10 years ago in a completely different version of the programming language to the one you’re using, and we know it doesn’t work anymore, in fact hasn’t for 8 years, but we’re going to close it anyway because screw you.
Also you should be doing it in Rust anyway
I assume being blown up by a terrorist is not everyone’s idea of a good time. Oh indeed anyones.
In what way am I wrong then?
Yeah. It is. Every design has assumptions and every design can be abused by those assumptions. I’d like to say it’s not a failure in design but it’s really just a failure of imagination. No one thought this would be an issue, turns out it is, so someone fixed it.
The problem is that not every system gets updated.
Apparently some phones have a totally isolated electrically separated microcomputer which is in charge of encryption and decryption. Your phone doesn’t actually know how the encryption decryption is done because it’s separated from the microcontroller.
Any attempts to modify the microcontroller or replace any of its components with more cooperative components, will result in all of the data being wiped. This is implemented at the firmware level with the instructions being in ROM.
There are attacks where rather than trying to crank the password you just capture the hash which is stored in memory somewhere and then using a tool that lets you bypass the standard login inject that hash into the app, totally bypassing the UI interface and the password hashing algorithm.
The app sees the hash is correct and isn’t aware that the information has been input via nonstandard methods, and so allows access.
The attacker still doesn’t have a clue what your password was, but they don’t need to. Interestingly enough this means that every time they want access to your data they have to do this because they don’t have a way of actually changing the password or finding out what it was.
It’s not destruction of evidence though because without a warrant the information on the phone isn’t evidence, it’s just stuff on a phone. Stuff which is your stuff and you have every right to delete it whenever you want.
They would actually have to arrest you and acquire a warrant, try it to getting you to unlock the phone for it to be “evidence”.
The police would have a very hard time in court saying that there was evidence on the phone when they can’t produce any documentation to indicate they had any reason to believe this to be the case. Think about the exchange with the judge.
“Your honor this individual wiped their phone, thus destroying evidence”
“Very well, may I see the warrant?”
“Yeah… Er… Well about that…”
It doesn’t matter what the police may think you have done, if they don’t go via the process the case will be dismissed on a technicality. They hate doing that but they don’t really have a choice.
Inactivity reboot.
The phrase “as a member of the intelligence community” is not the same “as as a mother”.
Assuming it is true, always a caveat on the internet, It would actually give them a unique perspective into the situation rather than just using it as a catch-all excuse for Karen’s to be an uninformed twit.
One of the things they teach in cyber security is to assume that no matter how much you bang on about secure passwords the client is still going to have Password1234!
. So you build around that.
Though people were a lot more blasé about security in general in the cold war. Computers were considered to be quasi magical boxes and it was sort of believed that they wouldn’t act against you.
It’s ironic because the hippies were the ones saying this in the past and now they’re the ones in charge.
Gives me hope that pretty soon I will be old enough to reap the benefits and damn the consequences. Really looking forward to it.
What indie developer would deliberately sign up with take two?
In the song that’s what they send every single day two French hens every single day are sent so yeah at the end they do send a lot of French hens.
There’s no way that’s going to cost less than $500. With a mount that costs $300