https://lemmy.ml/post/15430684
I asked a similar question before. Some recommended Revolut. Haven’t try yet tho.
pending anonymous user
https://lemmy.ml/post/15430684
I asked a similar question before. Some recommended Revolut. Haven’t try yet tho.
Is it really though? I would assume there would be automated systems that can do 80% of the job. It can be as simple as a USB key holding a portable executable that can run and connect to a remote system and report back the findings which the officer can just read the report in plain English. Training, of course, is expensive and rarely do so, but automation can get somewhere close relatively inexpensive.
Sorry. Data structures exists and uniformly random data is rare. Patterns still exists.
And deleted is a bad counter as deleted files won’t have a record in the file system.
That scanner is simply looking for high entropy data, and then report to its operator. It wouldn’t care if it is a drive or a volume or a file. If the entropy is high, flag it.
All random data have high entropy, same for encrypted data. The officer can see you have high entropy data then start throwing questions at you.
This community need better understanding of cryptography and how it translates to real world. Deniable encryption exists and does work on paper, but only on paper.
It is simply no hope aginst an automated scanner. No one search for files manually today.
The point is they don’t have to proof if a piece of random data is indeed an encrypted blob.
Imagine you passing border security and got selected for search. They found a piece of data on your device with high entropy without known headers in the wrong place. You can claim you know nothing about it, yet they can speculate the heck out of you. In more civil nations, you might got on to a watch list. In a more authoritive nations, they can just detain you.
They don’t have to prove you hiding something. The mere fact of you have that piece of high entroy data is a clue to them, and they have the power to make your life hard. Oh you said you deny them for a search? First congrats you still have a choice, and secondly that’s also a clue to them.
For more info, read cryptsetup FAQ section 5.2 paragraph 3, 5.18, and 5.21. It is written by Milan Brož who is way more experienced than me on this matter.
IMO, deniable something encryption is just not practical in real life. Authorites can make you life real hard, or just throw you straight into jail, just by suspecting you have encrypted materials.
Spammer. He already made 14 posts with the same thing. Along with @testinghead@lemmy.ml and @testinghead@lemmy.world. I bet it is the same guy.
deleted by creator
How about no lock in from the get go?
deleted by creator
Missing file I can understand, but how they infect the user with malware? Is it through the BitTorrent protocol, or undisclosed vulnerbility of the Grid Service? The kill chain isn’t complete.
P.S. The use of BitTorrent in Korea by service providers is somehow justified IMO given how expensive the bandwidth is which Twitch quit the market.
How many know what even signed commit and build is? For people following a guide they don’t even know what Github is for but a nice place to have free programs.
Just tell them unlock their phone so you can take a look of his browser history. Works quite a few time for me.
When they mirror it, does they uses a different username? If so I’m totally fine as that’s just a fork, otherwise it should count as stolen. Not the project but the name and reputation of the owner.
I have simplex notification service running 24x7. while rarely open, i never missed a message when it arrive (i use it as a message bridge between my devices). Nor I feel it uses more battery that it can’t hold a day of use despite it running constantly in the background. I’m using S21FE btw.
OpenBao, fork from vault
Define your criteria for an ideal messenger. What do you need actually? What’s your security requirement?
Well. The claim they made still holds true, despit how I dislike this design choice. It is faster, and more secure (though attacks on NAND chips are hard and require high skill levels that most attacker won’t posses).
And add one more: it saves power when using LPDDR5 rather DDR5. To a laptop that battery life matters a lot, I agree that’s important. However, I have no idea how much standby or active time it gain by using LPDDR5.
Say I lived there. BBC needs fundings I get it, but what the BBC contributes to when I watch VoD? Not even watching live programmes as zero of the content have BBC ever contributed. When the content is licensed via BBC, I already paid part with my subscription. Thst’s a disgusting double dipping. If no one watches your programmes that’s your problem, and citizens have no responsibility to keep a corporate from collapsing. This shit reminds me of how NHK works in Japan.