Not having to interact with Nazis is tied to which instance I signed up on? I’m confused by this argument.
Not having to interact with Nazis is tied to which instance I signed up on? I’m confused by this argument.
I feel like people need an education about the difference between spirit of the law and letter of the law.
This comment reads like this:
“I posted some truly heinous shit and a mod/admin removed it but I didn’t break any written rules therefore my right to force other people to be subjected to my desires was impinged upon😭😭😭😭.”
A thousand novel mistakes.
The two cases, they knew what it was and they did it maliciously. They didn’t know what they were doing and got socially engineered in the process. Both cases are cause for failure.
Sure. But for an entry level interview as a pen tester… Scanning with Kali should be an easy task.
Using Kali? Easy if you have training. The capstone for our security course a decade ago was too find and exploit 5 remote machines (4 on the same network, 1 was on a second network only one of the machines had access to) in an hour with Kali. I found all 5 but could only exploit 3 of them. If I didn’t have to exploit any of them 7 would be reasonably easy to find.
Kali basically has a library of known exploits and you just run the scanner on a target.
This isn’t novel exploit discovery. This is “which of these 10 windows machines hasn’t been updated in 3 years?”
Separation of data between accounts makes them fall under different retrieval requirements.
As one account, a request for all of the data from that account contains both chunks. Separation of those accounts separates the need to accommodate requests for data from one on the other.
It can also mean that internally they may have a sufficient mechanism that data that was previously identifying to no longer being identifying (breaking userid to data pairings for example) which is sufficient to “anonymize” the data that it no longer needs to be reported or maintained.
GDPR and pii reasons most likely. It’s a nightmare keeping track of why certain data is on certain accounts. This can vastly simplify the GDPR compliance mechanisms. If your GOG account is merged with your PR account, there is probably significantly more “sensitive” data (CC numbers, addresses, etc) in the GOG account. This probably exempts some data that either cdpr or gog tracks from deletion or retrieval requests.
Win12 confirmed 2044 release date.
Win12 confirmed as a Linux mint cinnamon derivative distro.
This will do the opposite of what you want. All of these policies disproportionately cause poor people to remain poor.
It’s not intuitive and it sounds great till you realize that unless you tax wealth and income with a progressive rate well into the 90% at the highest levels.
People who are wealthy don’t give a single shit about consumption tax. They also don’t care about transaction taxes (unless it’s progressive). A person with a million dollars doesn’t care if milk costs 5 bucks or 6 bucks a gallon… But the person making the minimum wage absolutely cares.
I don’t think either is actually true. I know many programmers who can fix a problem once the bug is identified but wouldn’t be able to find it themselves nor would they be able to determine if a bug is exploitable without significant coaching.
Exploit finding is a specific skill set that requires thinking about multiple levels of abstraction simultaneously (or intentionally methodically). I have found that most programmers simply don’t do this.
I think the definition of “good” comes into play here, because the vast majority of programmers need to dependably discover solutions to problems that other people find. Ingenuity and multilevel abstract thinking are not critically important and many of these engineers who reliably fix problems without hand holding are good engineers in my book.
I suppose that it could be argued that finding the source of a bug from a bug report requires detective skills, but even this is mostly guided inspection with modern tooling.
I haven’t. And now I believe you even less and think you are intentionally spreading rumors or lies because you have an agenda.
This was me in 2013…
I… Mean… You obviously don’t, but whatever.
Sorry. I apologize.
It’s frustrating trying to explain the same thing over and over again…
The tokens are how drm works. The process of DRM is token validation and enforcement of intellectual property rights granted by tokens.
I don’t know how else to explain it. It feels like I am back at my original post. I don’t know if you understand any better or if you still have misconceptions about what NFTs are or what DRM is or if you still think there is some magic in NFTs.
Yes, in theory that would work. But they actually make main disconnect switches for this in the event that the main breaker fails. It’s a mandatory install in all grid tie electrical generator systems (including solar).
Again, all of this already existed and will continue to exist with or without blockchain. There is very little novel in the implementation details of the tokens. The people who got the idea for "nft"s didn’t come up with a new idea. This isn’t some new math. The only portion of NFTs that is new is the cooperative signing… Which again, isn’t a new concept either.
Right now, everything you described… Literally all of it… Ubisoft implements for their launcher and enforce with their drm solution.
It’s for store finding. While you and I might not use it a lot of people do.