|
microsoft assport
|
![]() |
|
![]()
|
# ¿ Mar 22, 2023 19:54 |
|
Ur Getting Fatter posted:Pounded in my Law Enforcement Network by the Butt
|
![]() |
|
finally I can pirate a bad port of marathon and uh
|
![]() |
|
it's a dogcow
|
![]() |
|
no, but only because clarisworks has been subsumed into the historical section of the appleworks article
|
![]() |
|
I put in "butts" and it started talking about the Patriots so score one for machine learning
|
![]() |
|
this pi remake sucks
|
![]() |
|
what are the odds that you don't type in the name of your favorite beatle but pick it from a dropdown
|
![]() |
|
mega lol if you put the truth as answers to security questions
|
![]() |
|
stu sutcliffe isn't even in the rainbow table
|
![]() |
|
COACHS SPORT BAR posted:so what's the best E2E encrypted chat with a desktop client not written in electron these days imessage ![]()
|
![]() |
|
they learned nothing from the xbox (the first xbox, which was called the xbox 1)
|
![]() |
|
English As An Nth Language Where N > 1
|
![]() |
|
Krankenstyle posted:how does one speak english without learning it ask john searle
|
![]() |
|
the fdic is funded not by taxes but by charging premiums to participating banks so unfortunately there is less irony than there could have been
|
![]() |
|
someone pointed out that "windows" has the same first three letters as a certain children's book character
|
![]() |
|
Wiggly Wayne DDS posted:good thread to read in the morning: cool story bro
|
![]() |
|
Orcs and Ostriches posted:Is there a term for people tuning out (deliberately or subconsciously) common disclaimers or security warnings? alarm fatigue, probably
|
![]() |
|
Chris Knight posted:still better is that he HAD to mount his tv on the wall, like there was no other option available tweet says he just moved into this house and the TV mounting bracket was already there. guess the previous owner was the one who decided that would be a good idea. then this guy just started using it without thinking it all the way through, which while dumb is not *as* dumb
|
![]() |
|
the find my feature probably works by generating a per-activation key and storing it in the Secure Enclave which is a one-way operation. then both of those issues become a question of device tamper resistance which is not necessarily a problem find my has to solve itself. similarly there is probably a vendor key or device key involved which is also not retrievable through software iOS autocorrect will capitalize Secure Enclave, lol
|
![]() |
|
professional hostage negotiators, except the hostage is your company's data
|
![]() |
|
I've always heard that studying biology will make you marvel at the fantastic complexity that evolution and nature have achieved and studying medicine will make you marvel that our bodies ever work at all currently reading the emperor of all maladies and it's a long history of brilliant, driven people achieving so much and at the same time being absolutely wrong about so many things
|
![]() |
|
they released something whether it counts as a game or as a successful release depends on who you ask and how many spaceship jpgs they own
|
![]() |
|
not shocking at all reallyquote:Researchers found that Shutterfly, a photo-editing app, had been gathering GPS coordinates from photos and sending that data to its own servers, even when users declined to give the app permission to access location data. that's a little different than the headline makes it sound. that's not live user tracking in direct contravention of the permission flags, that's failure to strip exif data haveblue fucked around with this message at 16:42 on Jul 8, 2019 |
![]() |
|
ymgve posted:do android/ios still have permissions as "pretty please do not do this" or are they actually blocking system calls that the app haven't been given permission for don't know about android but for apple: -any permissions that pop up a dialog are enforced at the API level, if you tap no and the app makes the call anyway they get an error or a blank/useless result -the app store has a whitelist of permitted calls and using anything not on this list will get you automatically rejected. there are ways around this but if you're caught using them apple gets mad at you and has pulled apps over this in the past. it's also a great way to have your app spontaneously break on future ios releases ios also enforces its sandboxes and without a real exploit you can't do peeping hijinks haveblue fucked around with this message at 16:57 on Jul 8, 2019 |
![]() |
|
infernal machines posted:i seem to remember apple getting spicy over someone spoofing their USB VID to give a device itunes compatibility way back when iirc that was rhapsody, aka napster trying to go legit
|
![]() |
|
I don't remember the exact details but there was something about the proprietary ipod protocol that was closed and kept secret so only itunes could sync with it (and apple's version of musicmatch jukebox before itunes for windows). rhapsody or whoever reverse engineered this and released a client that could talk to ipods without approval. they went through a few rounds of protocol cat and mouse before giving up e: yeah that article e2: quote:That's bad news for Real - partly because the move limits the company's ability to sell to iPod owners, but mostly because no one has noticed until now, almost a month and a half later. That suggests that Real's iPod-owning customer base is rather smaller than it would like. lol haveblue fucked around with this message at 13:32 on Jul 9, 2019 |
![]() |
|
yeah there's two separate things going on here if you are a physical space and want to track inhabitants, you record every mac address that hits your APs so you can see how they move. this is what apple breaks by sending a different random mac to every AP if you are an app and want to track your user, you get the list of every AP in the area and send their macs off to skyhook or whoever. this will give your server the device's location without using the OS GPS service which would alert the user. this is what the apps were caught doing in that study
|
![]() |
|
I hope android has the thing ios does where you can go back and revoke individual permissions you've granted to apps
|
![]() |
|
some days you gently caress the sec...
|
![]() |
|
Raere posted:Why even bother having severities when 99.43% are high why did they have the green and blue bars on the terror alert level
|
![]() |
|
Potato Salad posted:ABC: Always Bcrypt Credentials
|
![]() |
|
https://twitter.com/phillipcaudell/status/1153239364283056128
|
![]() |
|
why does everything come with web servers these days is this a side effect of the rise of javascript UIs
|
![]() |
|
Cocoa Crispies posted:why would you spend power on tcp & ip for a mars rover curiosity sends data primarily through other probes in mars orbit that relay to earth, an off the shelf tcp/ip stack would work for that
|
![]() |
|
"commander we've decrypted the signal from the rover and there are definite signs of advanced life forms here" "well what does it say" "dear sir: your files have been encrypted..."
|
![]() |
|
Shame Boy posted:Security Fuckup Megathread: Im like > ipredator > tor > s3 on all this poo poo fits, do it
|
![]() |
|
Shame Boy posted:from what i've heard power-line network stuff like that is very popular in europe because a lot of their buildings (especially the old ones) are made of solid materials instead of cardboard and tape and so attenuate wifi real good this is my situation, I use them to unify the upstairs and downstairs wifi. I'm in the US but whatever the floor is made of does slay my base stations (prewar high-rise) haveblue fucked around with this message at 17:25 on Aug 1, 2019 |
![]() |
|
Windows 10 U.S.S. Enterprise
|
![]() |
|
![]()
|
# ¿ Mar 22, 2023 19:54 |
|
patent office should have been closed in like 1910 which was the first time someone asked. nothing was invented in the 20th century
|
![]() |