you don’t get entire functional UI elements accurately populated with appropriate data out of a “bug”. at best its a feature that was being tested internally and never would have made it past that, at worst its something that went live early.
you don’t get entire functional UI elements accurately populated with appropriate data out of a “bug”. at best its a feature that was being tested internally and never would have made it past that, at worst its something that went live early.
deleted by creator
Human Shield is a fun little linguistic trick that turns innocent human beings with lives and internality similar to your own into prop objects wielded by an inhuman enemy. This makes it way easier to justify mowing them down in service of your geopolitical goals. Every time that phrase is used it is a sign that someone is probably trying to justify something inhumane; usually something that would be considered a war crime if done against the ones using it.
“I smelled weed” is the classic cop trick to skirt around probable cause.
deleted by creator
if you want to go the SBC route there’s other options aside from Pis you might want to check out. Cheaper and more suitable systems that are easier to get ahold of. If you’re looking to get into it I’d look at LibreElec and Kodi with a Seren plugin setup that pulls from a Debrid service like RealDebrid. debrid removes the need for a vpn and is usually cheaper and faster.
they can tell im watching video, but the connection is over https, they can’t tell im watching episode one of star trek or whatever. unless they’re doing a mtm on all their customers to intercept SSL certs for the express purpose of traffic snooping.
ive been doing this for years on an ISP that has previously sent us a nasty note about piracy when someone did a torrent, so I think i’m probably ok man.
pirating video is as easy as visiting one of the dozens of streaming sites with a device capable of running a browser that can play video and run an adblocker.
Yet even if the snack-dye technique remains relegated to lab mice, it offers a better window into one of the most commonly used model organisms than we’ve ever had before.
The writer was definitely smirking to himself when he wrote this line.
“()()” is an ambigram, which wikipedia describes as “visual palindromes”, for whatever that’s worth.
The only thing that has successfully managed to thwart the FBI in their attempts to break into a phone was Apple’s hardware based encryption. To such an extent that they took legal and legislative actions to try and circumvent it. The specifics of how the encryption works is irrelevant to this argument, and you are more than welcome to consider that point conceded.
I’m not claiming iPhones are superior. I don’t care about dumb OS wars, just don’t put things on your phone expecting that they can’t be retrieved. That’s the only point I’m trying to make here.
And the keys absolutely would give them access since those keys are used to sign Apple software which runs with enough privileges to access the encryption keys stored in the “Secure Enclave”. Anything you entrust to a company’s software is only as secure as the company wants to make it, and the only company to publicly resist granting that acces is Apple (so far)
The Secure Enclave is a component on Apple system on chip (SoC) that is included on all recent iPhone, iPad, Apple Watch, Apple TV and HomePod devices, and on a Mac with Apple silicon as well as those with the Apple T2 Security Chip. The Secure Enclave itself follows the same principle of design as the SoC does, containing its own discrete boot ROM and AES engine. The Secure Enclave also provides the foundation for the secure generation and storage of the keys necessary for encrypting data at rest, and it protects and evaluates the biometric data for Face ID and Touch ID.
https://support.apple.com/guide/security/hardware-security-overview-secf020d1074/web
The FBI wanted access to Apple’s encryption keys which they use to sign their software. They don’t have ‘your’ encryption keys, they have their own that the FBI wanted to use to bypass these features. They eventually dropped it because they found a zero day exploit which apple fixed in later versions. That is why the newer phones aren’t vulnerable (yet).
They’re exploiting vulnerabilities and back doors not brute forcing your passcode. The only way you’re keeping them out is with hardware encryption which the iPhone has and probably why it’s the only one not vulnerable. Hardware encryption also won’t matter if your vendor shares their keys with law enforcement. As far as I’m aware, Apple is the only one that’s gone to court and successfully defended their right to refuse access to encryption keys.
Don’t put anything incriminating on your phones.
All you’ve really demonstrated is that China and Japan are well represented in one very specific pollution phenomenon but not why that is. There are a number of reasons that those two could be overemphasized that aren’t “these guys are doing all the plastic pollution”. For example, ocean currents probably play a big role, in combination with the location of the patch itself.
You cannot extrapolate this out into a representative sample of the sources of all plastic pollution, it’s statistical gymnastics. Hell, the article you linked even offers an alternative explanation for why Japan is so high:
One of the reasons that Japan is thought to contribute so highly was that the 2011 Tōhoku earthquake and tsunami washed large amounts of debris offshore.
It’s at the end of the article though so I can see how you might have overlooked it in your rush to place all the blame on foreigners.
In this real world people don’t vote for popular candidates, I am a political genius.
damn. sounds like they should run someone more popular with the same agenda, then. pretty easy thing to fix, really, unless you’re more dedicated to the man than the platform.
Wow the head of AI for MS doesn’t know what the word freeware means.
Chinese spies incepted Biden into acting like a demented 81 year old with the Havana syndrome gun.
Yeah it is possible he’s accurately, but misleadingly, calling it a bug because it was not meant to be deployed to production (yet). I do not think that’s how he wants or expects people to take it when he calls it a “bug”, though.