..... Wait, what?
Oh. Nevermind then.
..... Wait, what?
Oh. Nevermind then.
Not much use if the create a distraction and grab the laptop before you can do anything...
It was encrypted. And seized while he was logged in and active.
Initial analysis was done before the laptop was allowed to shut down.
The feds may be cavalier about laws, but it's a mistake to think they are stupid.
Apparently he was arrested (in public) at a library, and the techs who got the laptop knew what they were doing...
It was logged in, and they spend several hours copying data without letting it sleep or lock.
Full disk encryption is great, but assumes that you won't have unlocked it for the attacker.
> In Canada, once you have paid for a license of a movie, it is legal to rip it from a physical copy, or download a digital copy.
The problem being, is that it is still illegal to upload that digital copy. And bittorrent is peer-to-peer, which means unless you have specifically configured your client to *not* *share* with other members of the swarm, you are uploading.
Where do you think the notice companies get your IP address? You sent them a piece of whatever content they're complaining about.
The creation itself seems troubled with the possibility of fraud.
Do some reading. Bitcoin is absolutely uncounterfeitable.
Unfortunately, there have been more than a few fraudulent exchanges, which has more to do with the involvement of amateurs than anything else. The marketplace is improving fast.
There have been multiple places where the total paper ballots cast exceeded the number of eligible voters. Paper changes the fraud, but does *nothing* to stop it.
Stuffing a ballot box with fraudulent paper ballots is risky, and relies on many people to be effective in multiple polling locations.
Falsifying electronic records requires a few people at a strategic points, and can be impossible to detect.
Yes, of course your lending habits are kept private, and legally protected. You can relax.
The access logs of the security cage, on the other hand.....
Yeah, I saw that 30 seconds *after* hitting the submit button.
I got hit April 25th with this. I noticed within an hour, and it took me about an hour to determine that my connection to the pool had been spoofed, and my miners redirected to the attackers pool. I had no idea at the time *how* it was done.
My mining software was a couple of months old at the time, and the latest version would ignore such redirect requests. I updated and continued on, having lost maybe 2 hours of mining.
The redirect comes from that fact that the "Stratum" protocol used by many minors to request work from the pools was originally designed as a wallet to blockchain server protocol. Under that use case, it makes sense that the server might suggest to a (wallet) client that they use another server.
There is a hierarchy of trustworthiness with the judge at the top, and the dirty criminal at the bottom. Anything the police say will be believed over what you (the dirty criminal, otherwise why would you be arrested) say. Lawyers are above the police in that hierarchy.
Pick a nice, long, secure passphrase. Use it to secure a GPG keypair. Back up this keypair in multiple locations, and with multiple people who know "This is the key that encrypts all of my digital stuff. My family will need it when I die.".
Use that keypair to encrypt all of your important passwords and data. Back up the encrypted files in multiple locations. Make sure your family knows where these locations are, and why thy and the files they contain are important.
Download a copy of http://passguardian.com/ . Load the saved copy (preferably in an offline PC) in a browser, and use it to convert your passphrase into several N of M parts. ie: Create 10 parts, and require at least 6 to reconstruct the passphrase.
Use something like http://goqr.me/ (or any other generator) to create QR codes for the 10 secret shares. Laser print the text share, QR code and some instructions onto a business card sized piece of paper, and have them laminated.
You now have 10 waterproof, hard to damage cards, any 6 of which will unlock your digital data. Distribute them to trusted parties and locations with instructions to use the shares once they hear and confirm your death. These parties don't have to be literate enough to merge and decrypt the data themselves, they just need to know that it is possible with their share. On your death, they will arrange to bring the shares and data together, and even if they have to hire a nerd to help them, they will unlock what they need.
Alamo Drafthouse is banning them, and I doubt they care at all about the piracy thing - they ban talking and any sort of device use or distracting behavior flat out. People go there to watch the movie, if you want to play with your electronics instead, there are plenty of other places to go.
And from what I've read, if they catch you using your electronics, they'll help you get started finding those other places by escorting you to the parking lot.
Corded phones didn't cost $350 - $500 either.
$350-$500 puts you into the range of cheap trash and knock-off timepieces. Try adding a zero. Or two.
I'm a geek, and I've got a Pebble that I wear fairly regularly. But the watch I wear when I want to dress up a bit (or when I get tired of the cheesy plastic smart watch) is a Tag Heurer with an automatic movement. The Pebble is neat, and has IMHO the right balance of features and price. But it has no soul.
Dreams are free, but you get soaked on the connect time.