Comment Re:I would hope so (Score 1) 80
Exactly. I have no way to tell whether the mail app on my phone uses any kind of encryption.
Exactly. I have no way to tell whether the mail app on my phone uses any kind of encryption.
CGP Grey did a nice video on this topic.
In single-strain infections, NF1 remains localized, does not spread to the bloodstream or organs and is cleared by the host immune system. NF2, however, produces a toxin that breaks down muscle tissue and allows it to spread to the bloodstream or organs.
In multi-strain infections, the toxin produced by NF2 breaks down the muscle tissue and enables NF1 to travel to the bloodstream or organs where it becomes deadly.
"Please tell us whether you plan to use this PC for highly sensitive data, so that we may send you one of our 'specially prepared' PCs."
Why should this be a problem for the owner (to disclose or not) or for the visitor (to visit or not)? Why don't these "smart devices" simply avoid doing anything objectionable?
When guests come over, I don't have to disclose that I have a dildo in my nightstand. But that's because it won't jump out on its own and assault my guests.
Bluetooth audio is handled through system settings, is separate from apps, and will continue working for apps that you deny permission for.
The only reason that Hong Kongers only have to deal with tear gas right now is that the police know they don't have weapons. Things would be a lot more nasty if Hong Kongers even had the chance of being armed.
Unless you send just an ID of the new message and the app uses an encrypted call to get the data. You do not HAVE to send message text over push notifications, and for that matter even if you did you could leave that encrypted.
The point isn't whether Apple can see the message content. The point is that Apple can see that there is a message being received and that Apple logs that information. Given those logs, you could create clusters of people who get messages at the same and who are presumably in the same group chat. There is probably other information you could datamine from those logs as well. Users of end-to-end encrypted chat apps would like to keep that kind of information private.
"People like us do things like this" is a very powerful technique for building tribes and marketing.
I enjoyed these videos to learn about getting arbitrary read/write access to memory through javascript using the addrof and fakeobj primitives.
After reading the original source linked from here, I retract my previous statement. Improbable, but possible, and fascinating.
I agree. A website was able to download someone's "Gmail database"? That seems improbable.
Also important from the article:
Google said it had reported the security issues to Apple on 1 February. Apple then released an operating system update which fixed the flaws on 7 February.
Opera has a "browser.js" file that contains patches such as "Pretend to be Chrome on barnesandnoble" whereby it impersonates other browsers to get around pages blocking it with "incompatible browser" errors.
I couldn't find much information on it, except that the file is stored next to your preferences, and that you can turn it off by going to opera://browserjs
It's a picture that even includes stuff behind the black hole. Check out this video.
The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.