you don’t get entire functional UI elements accurately populated with appropriate data out of a “bug”. at best its a feature that was being tested internally and never would have made it past that, at worst its something that went live early.
you don’t get entire functional UI elements accurately populated with appropriate data out of a “bug”. at best its a feature that was being tested internally and never would have made it past that, at worst its something that went live early.
deleted by creator
The only thing that has successfully managed to thwart the FBI in their attempts to break into a phone was Apple’s hardware based encryption. To such an extent that they took legal and legislative actions to try and circumvent it. The specifics of how the encryption works is irrelevant to this argument, and you are more than welcome to consider that point conceded.
I’m not claiming iPhones are superior. I don’t care about dumb OS wars, just don’t put things on your phone expecting that they can’t be retrieved. That’s the only point I’m trying to make here.
And the keys absolutely would give them access since those keys are used to sign Apple software which runs with enough privileges to access the encryption keys stored in the “Secure Enclave”. Anything you entrust to a company’s software is only as secure as the company wants to make it, and the only company to publicly resist granting that acces is Apple (so far)
The Secure Enclave is a component on Apple system on chip (SoC) that is included on all recent iPhone, iPad, Apple Watch, Apple TV and HomePod devices, and on a Mac with Apple silicon as well as those with the Apple T2 Security Chip. The Secure Enclave itself follows the same principle of design as the SoC does, containing its own discrete boot ROM and AES engine. The Secure Enclave also provides the foundation for the secure generation and storage of the keys necessary for encrypting data at rest, and it protects and evaluates the biometric data for Face ID and Touch ID.
https://support.apple.com/guide/security/hardware-security-overview-secf020d1074/web
The FBI wanted access to Apple’s encryption keys which they use to sign their software. They don’t have ‘your’ encryption keys, they have their own that the FBI wanted to use to bypass these features. They eventually dropped it because they found a zero day exploit which apple fixed in later versions. That is why the newer phones aren’t vulnerable (yet).
They’re exploiting vulnerabilities and back doors not brute forcing your passcode. The only way you’re keeping them out is with hardware encryption which the iPhone has and probably why it’s the only one not vulnerable. Hardware encryption also won’t matter if your vendor shares their keys with law enforcement. As far as I’m aware, Apple is the only one that’s gone to court and successfully defended their right to refuse access to encryption keys.
Don’t put anything incriminating on your phones.
If all your sponsors and business partners immediately flee you at mach speed over what you sent to that kid, it was certainly well past “inappropriate”
If you disable it you can prevent Microsoft from force updating your windows 10 install to windows 11. Obviously a play to get people to buy new hardware for 11 but a useful anti feature I suppose until you can stomach switching to Linux.
Unless you’re expecting a third game in a series.
The game is like 90% content that I enjoy with a small annoyance I can skirt around by reading a few wiki pages. I come to these games for satisfying combat, not obtuse quest lines you can miss without precognition.
a fine is a price.
It’s the ISP cutting the Ethernet by opposing net neutrality so they can force you to use their overpriced cable TV service. An inverted mockery of the traditional “cord cutting”, just as the image depicts.
The thing exact thing Squid Game is satirizing resembles Squid Game? I’m shocked.
Why not? Nationalize it and treat it like the infrastructure it is. Take the ISPs, too, while you’re at it.
Video is nearly impossible to host in a sustainable way. The bandwidth usage is among the most expensive things you can host. The only way you’re getting something better than YouTube is if it’s tax funded somehow.
I’m of the opinion that not every company needs to expand indefinitely. Most things should probably just stay at a sustainable level.
how is it an experiment to restore things to the way they used to be? pretty sure we already know how it works out.
I don’t foresee anyone with the kind of data needed to do more investigation releasing it to the public, so I doubt we’re going to be getting any satisfying answers to this. Microsoft may have an internal team combing through github logs, but if they find anything they’re unlikely to be sharing it with anyone but law enforcement agencies.
we know about the singapore VPN because they connected to IRC on libera chat with it. the only reason I can think people would believe they’re from hong kong is because of the pseudonym they used, but it’s not like that proves anything.
see link posted in another user’s reply: https://boehs.org/node/everything-i-know-about-the-xz-backdoor#irc
Yeah it is possible he’s accurately, but misleadingly, calling it a bug because it was not meant to be deployed to production (yet). I do not think that’s how he wants or expects people to take it when he calls it a “bug”, though.