pending anonymous user
you mean the seed? i though that should be written on paper, store in a safe, and never on any electronic medium.
I’m interest at the eve part as I’m looking to join. Is cheating common?
EDIT: missed a word
What you think the modem can spy on by whom? Certainly not the ISP I suppose. They can already do it without the modem.
I expect “modular” as in how Fairphone approaches it.
It is NOT. It is just a smart case with pogo pins that can communicate with the phone.
EDIT: I think using “smart” is too much credit to them.
So what if constants aren’t constants?
Will Affinity product line be the next as Canva bought them?
Sorry mate and all waiting for a show and some solid proofs. That happened in the second half of 2010s, and I do mailbox cleanup every year. I tried dig through what left but I think that violation notice is gone forever. Back then I was just a noob and though that’s normal for such big name provider, so I consider bad luck, and switch.
Not rapidseedbox. I used them before and one time it removed my download saying DMCA violation. I unsub and change to fully self host my own seedbox on a dedicated machine with one provider.
The apology reads:
Dear Samsung Galaxy Z Fold owners, we’re sorry. We know you were excited to buy a phone that folds in half and fits in your pocket, awkwardly. You were promised the future, a technical marvel, a world of boundless multitasking and performance.
And now, you’re probably looking at the new HONOR Magic V3 and feeling a little… betrayed. Size matters, and we feel your pain. Like being tipped for a gold medal and then coming last in the race, the knowledge that a thinner, lighter, and more durable foldable exists is enough to make anyone question their choices.
We get it. You were an early adopter, a pioneer bravely venturing into the uncharted territory of foldable screens with questionable durability. You deserve better. In fact, you deserve a gold medal.
In all seriousness, we at HONOR are committed to pushing the boundaries of technology and bringing you the best possible foldable experience. We’re just saying… it’s okay to feel let down. We’d feel the same way.
Surprising to see after the CrowdStrike debacle.
I think that started on Win8 and fully implemented on Win10. I don’t remember Win7 have this BS. At least not obvious that makes me remember if they have.
Lucky me I rarely get spam calls
Photos are never a concrete representation of the reality. Photos are being pre-processed by image processor already and we also got Photoshop. One can even fake a film based photo if he knows what to do. The proliferation of image generation models and impainting models make the access easier but image manipulation tools always exist.
Is it really though? I would assume there would be automated systems that can do 80% of the job. It can be as simple as a USB key holding a portable executable that can run and connect to a remote system and report back the findings which the officer can just read the report in plain English. Training, of course, is expensive and rarely do so, but automation can get somewhere close relatively inexpensive.
Sorry. Data structures exists and uniformly random data is rare. Patterns still exists.
And deleted is a bad counter as deleted files won’t have a record in the file system.
That scanner is simply looking for high entropy data, and then report to its operator. It wouldn’t care if it is a drive or a volume or a file. If the entropy is high, flag it.
All random data have high entropy, same for encrypted data. The officer can see you have high entropy data then start throwing questions at you.
This community need better understanding of cryptography and how it translates to real world. Deniable encryption exists and does work on paper, but only on paper.
It is simply no hope aginst an automated scanner. No one search for files manually today.
The saving grace is it is licensed under AGPLv3 so community can take over if something happen.
Any source on this?
I guess he is referring to VK, but I heard he was foced to get out.