the commercials that have already been paid to the company are still showing, so that ad revenue is still being capitalized.
That’s not how it works though. You are not accounted for watching the ads over a pirate stream…
the commercials that have already been paid to the company are still showing, so that ad revenue is still being capitalized.
That’s not how it works though. You are not accounted for watching the ads over a pirate stream…
Honestly, don’t give them ideas…
If a business quite literally controls a country we are fucked.
I stopped using Signal when they dropped SMS support.
It’s a great project but with very bad leadership and strategy.
They definitely had the best shot to secure communications and wasted it.
Also people regularly spend more than they can afford.
When you think about it the fact that you can quite easily borrow money you clearly will not reimburse which is kind of an infinite money Glitch for capitalism.
Thanks ! That’s exactly how I think it could be implemented but that confirms that this is certainly not something you can find commonly where I live.
That confirms the fact that if you use the same wifi and everyone has entered the same encryption key then there is no real client isolation…
It’s cool that wifi keeps evolving. It comes a long way from the WEP beginnings.
Do you have any documentation on how this work ? Is there a name to this special protocol? Is it a recent addition to the wifi standard ?
Again a wifi AP doesn’t send data to a specific client. So how does an AP can enforce that one client can’t read a frame for someone else that is properly authenticated? How would an AP prevent someone spoofing mac addresses from receiving that data ?
I’m really confused by this feature I never heard of even when I was playing with aircrack and so on. Yes sometimes your mac address can get filtered but even that is not really difficult to avoid.
Sorry I have so many questions but I honestly did quite some “tinkering” with wifi years ago and none of this sounds familiar.
I like turtles.
Thank you for understanding.
I have no idea what this client separation is.
As far as I know there isn’t really any client separation on wifi. It’s a shared medium.
At least I don’t see anything preventing you from reading someone else traffic. So anything unencrypted on a wifi is also accessible to any other clients.
I had tools more than 10 years ago that could automatically hijack session cookies on wifi for anybody connected and not using https.
Edit: I know, I shouldn’t give a shit. But writing a fairly long comment to share my knowledge on this only to see it immediately downvoted without any explanation kind of sucks. So I’m removing this comment and will not interact here anymore.
* in 360p.
The problem was solved by Nvidia, then AMD made it cheap and accessible and not requiring a dedicated hardware module.
For years and years Nvidia increased artificially by up to 150 euros many Gsync screens and for no legitimate reason. Initially there was NO compatibility with free sync at all.
Nvidia wasn’t kindly solving a gamers problem at least to after the first year of release of that tech. They were forcibly selling expensive hardware modules nobody needed or wanted. And long after freesync showed you could do it just as well without this expensive requirements.
This hardware module they insisted on selling wasn’t solving a technical problem but a money one.
I don’t even think anyone was ever able to differentiate between the different qualities of “sync techs”.
Not OP but everytime I used the verbose output of ssh it didn’t help me one bit. Even adding outrageous verbosity I was still quite confused on what step failed and which didn’t.
I’m probably just bad at understanding SSH but i don’t know it seems like ssh workflow includes many trial and error until it finds a way to connect.
Imo the verbose output of SSH is often not very helpful if you don’t know very well ssh in the first place. Obviously it is still worth a shot and a good advice but don’t expect ssh to clearly state what is going on :)
Trump chooses a topic, lies constantly about it and let people get tired fact checking. Would crowd size be on the news without Trump activating that subject?
I thought it was pretty clear China is an ally of Putin…
Didn’t Russia and China do a military exercise together very recently? Chineses bombers were photographed with a Russian jet escort. And it was pretty clear Russia and China wanted to be seen together.
They do deliver embargoed parts to Russia as you said and are training with Russia and not NATO countries.
China is an ally of Russia…
Source (in french):
There would be no reason to adhere to complicated EU rules everywhere else globally.
But there are a ton of websites that do adhere to complicated GDPR rules even though they serve 99.99% US based clients.
I think this has nothing to do with EU and it’s just some far fetched bullshit excuse from Microsoft.
Do not forget that accessing stuff on Google can probably get you to prison.
When you see something illegal on Google that should have never been published publicly you need to immediately avert your eyes and plug your ears. 🙉
Don’t be the next Aaron Swartz…
There should be laws and fines for this.
Here in France you can technically be fined for not securing properly your wifi. It was put in place by something called HADOPI which tries to catch movies shared on torrents. Unsurprisingly, the lobby of record labels managed to even make sure you couldn’t pretend someone hacked your wifi and downloaded illegally. But I’m sure the same bill but applied to businesses wouldn’t ever pass.
Businesses could leak all your sensitive data and they won’t get anything beside bad PR but a single french citizen not proficient enough to secure his wifi may get in trouble.
Is it possible that this password was really your gf’s password in the past ? It could have leaked long ago and the hacker just decided to use a previously leaked pass to be more inconspicuous.
I don’t think this whole story is so wild, it could be just coincidental. The hacker knew somehow about her DOB and thought this would be an easy password.
Rest assured a hacker wouldn’t want to use their own password or reuse even one as that could link to previous nefarious activity. So they had to set up a brand new password just to move forward. So they set up anything personal they could get their hands on.
PS: you should check haveIbeenPwned for the address of your gf.
Apple definitely has that kind of practices too.
Louis Rossman probably has a 40+ MN long rant on this somewhere on his channel.
Edit: Only a 20+ Mn long rant… https://www.youtube.com/watch?v=qV4_mLw2BGM&t=1
Honestly, Apple was for years very anti-repair.
So the manuals are nice but that doesn’t absolve them for the decades of products designed to be hard to repair on purpose.
I won’t go full Rossmann but seriously Appol very bad when it comes to repairability and reliability. But they can release a few manuals and they are absolved for their bullshit?
It’s a start but Apple still makes purposefully hard to repair products.