

phone bad.
Posted from my iPhone.
phone bad.
Posted from my iPhone.
Sabotage is in quotes because they are directly quoting someone. It’s not a euphemism.
Great point. The range shown in the article doesn’t seem to be that big of a deal for me, but I suppose it could matter for some situations.
I’ll be the first to say it’s not an inherently sexual thing, but I agree it’s a weird suggestion.
Going to any interest group meeting when you aren’t actually interested in the topic is kind of weird.
Makes sense, thanks!
Can anyone ELI5 how we are able to release new standards all the time? Are there technological advances that allow more bandwidth? If not, why not start with higher bandwidth?
Plumbers, electricians, homebuilders, sanitation workers, and electrical workers. Who’d I miss?
Thank you all for a fine poopie.
Probably more “ill-informed” than “disingenuous” but I agree.
Who is this guy? That’s not Ned Stark lol
Where was Gondor when the Westfold fell?
I’ve used y’all intentionally as a gender neutral term for years in the south.
Lately I’ve even seen “y’all means all” used as a pride slogan in the south.
While I disagree with OP, that kind of information isn’t classified. It’s personally identifiable information which is restricted and secured, but it’s not classified in the same sense as the person who leaked on discord.
In response to op, there are plenty of legitimate reasons to classify information that are not nefarious. For example, a diagram explaining the security systems for a building. It’s better to restrict access to that document so it is less likely for an adversary to see the details, because all that would really do is enable them to identify weaknesses which they could exploit. Generally this sort of thing is called operational security and I think it is actually the basis for the US government’s mandatory access control in the first place (e.g. “loose lips sink ships”).
Isn’t this the whole point of tenure? To protect academic freedom?
According to reporting, they have actually done this before.
Most of the discussion I’ve read about this is along the lines of: clone the drive on the phone and then brute force the clones (circumventing the lockout issue: if you get locked out just keep trying on a new clone).
In a relatively famous case, the FBI cracked the password on the San Bernardino shooter’s phone, but did not explain how they did it: https://www.vox.com/2016/3/29/11325134/apple-iphone-fbi-san-bernardino-case-ends
Here is a company selling a brute force module for iPhones, although they don’t explain how they get around the lockout issue: https://belkasoft.com/unlocking-ios-devices-with-brute-force
Here is another article about a company that claims to be able to brute force iPhone passcodes: https://www.vice.com/en/article/how-to-brute-force-iphones-graykey/
Honestly I do this kinda thing all the time. Make minor adjustments in my life to reduce risk. Like if I’m going on the subway and the escalator is stopped, I’ll just walk up the normal stairs, since there is a minor chance that an escalator could collapse
In this instance, it takes nearly the exact same amount of time to go around the pole and there’s no risk of it falling on you or whatever.
I believe there was formerly a subreddit called 195, and 196 is the successor of that. Idk why the previous one was called 195.
I saw it as neither. I thought his gas-powered time machine had run out of fuel, so he’s walking to the nearest gas station (the joke being that there won’t be a gas station in this era, so he’s trapped).