Now do the cables 😈
Now do the cables 😈
Damn, I should check out temu…
Magnetic disks. The person who said ssds hasn’t tried it. Spinning magnetic disks lose their data much more slowly than any ssd cell.
Even 3.5” floppies do better than ssds.
Even with perfect algorithms I think it’s reasonable to expect problems within society to sharpen.
I mean if there was some theoretical social media entity completely disconnected from optimization for its own benefit then the people using that system would still have been provided the tools to do all their social relations faster, more often and with more intensity.
That’s gonna, and maybe I’m giving away the game here, uh, heighten the contradictions.
Isn’t social media just a distillation of the interactions innate in society? If exposure to social media is damaging that’s indicative of deeply flawed and damaging society.
lol that sucks for the company but that’s what you get when you don’t use some kind of MDM scheme to retain control over assets. It’s especially costly to learn this lesson with Macs though.
I repair and resell scrap computers and if you’re able to prove ownership or have a business that repairs or otherwise handles Mac computers the people at the Apple Store will disable the lock for you. They take down your name and tax id and stuff though, so there’s some accountability, and it’s not easy to get to that point when you look like a greaseball and aren’t a member of apples authorized repair program. Ask me how I know lol.
Tbh it’s no different than a Chromebook or windows laptop that shows the owners email based username (in the case of windows computers with Microsoft ids it shows the users real name as well!) at the login screen, except that you can’t wipe it and resell it.
Eh, I think the alternative is worse. If you could wipe stolen phones with impunity they’d be even more of a theft and fraud target than they already are and if they were just locked down with no way out then it’d be more wasteful than it already is.
I’m gonna wait to see how this is implemented but it sounds bad on the face of it.
I thought they had a batch of fortigate hardware whose baked in keys got leaked and their response was to recommend that affected devices be removed from service, no update fix, no patch, just “stop using them, we can’t fix it”.
Sorry for not having more information on hand, I’m on mobile at the moment and the nist database is tough to navigate with fat thumbs.
Oh. The fortigate wasn’t one of the ones that had to be replaced because of a cvss 10 was it?
You can run pf sense on fortinet stuff?
Critical support
when you end up with someones iphone (or mac or ipad or whatever) and you want to wipe it, the computer needs you to enter the credentials of their icloud account. it tells you whose icloud credentials you need, just like having the username entered but asking for the password.
icloud usernames can be used to send imessages to the owner of the account, like you could call someone with their phone number or IM them with their screen name.
the idea is that a thief ought not be able to just wipe and repurpose a stolen device but a gifted or purchased device should provide a method to contact the person so the new owner can wipe it.
it works pretty good because if a local thief contacts you trying to get you to let them have your device you can call the cops and you already have a line of contact with the person who has the stolen goods so the police can’t even say “yeah whatever, we don’t care, its gone heres some tissues” and it’s very easy to track them down. it also works great if you buy a used device from someone and they won’t clear it to wipe because if you have a transaction record like on ebay or facebook marketplace or something you can also go to the authorities and say “hey, i bought this, here’s proof, and the person i bought it from won’t relinquish ownership of it”
what happens now is thieves ship a bunch of phones off to somewhere outside the juristiction of the victims governments and then they break em down to be sold for parts. now there’s nothing the authorities can do and the thieves accomplices can try to socially engineer the victims into giving them what they want with impunity.
that’s whats happening in the linked article, the victim is being harassed by whoever bought their phone from a thief.
I’m saying this as a lifetime Linux user and decently tech competent person who knows all about the different android roms: if you’re considering it, switch to ios as soon as you can. Buy the phone outright from apple, no financing or plan.
That’s cool, but is there a subset of features or cpu bound operations or something that makes it worth going through the trouble just to run a faster(?) cpu with slower memory?
you mean in the case of a dead USB ic or something or do you mean the USB port isnt standard?
I solder new usb connectors and all manner of other connectors on to stuff all the time.
I’m at a 100% success rate getting data off stuff that just needs new connectors.
If you need data recovered, the literal best case scenario is that it’s just got a bad connector.
i meant the claim that teslas are the top made in america cars. i looked and found cars.com’s list of the most made in america cars and their dubious Made in America Index and that’s about it.
i also want to just throw an electronics manufacturing industry scoff at the CBOs methodology. i used to work for an electronics manufacturer that did mostly pcb assembly. a bunch of the work was government contracts or prestige stuff that had to say “made in USA” on it as opposed to the more clear symbol of a hollowed out manufacturing sector, “assembled in USA”. every day truckloads of parts from china would get soldered to PCBs from iirc taiwan and that was enough to earn made versus assembled.
how was that figured out? most evs have a less complex manufacturing process and rely on a shitload of electronic components that aren’t manufactured domestically. i’d be interested to see the methodology!
it runs a voltage regulator inside the cable