I don't have admin privileges and can't install Firefox on my work computer but I can install Firefox on a thumb drive and then run it from the thumb drive because IT admins are idiots
echodot
I'm not convinced anyone actually likes vim. They are just use it to be edgy.
Nobody uses notepad the way Microsoft thinks people use notepad.
Somebody already did that but it wasn't with chat GPT and honestly the docs were fine.
It didn't do that thing that a lot of humans do when writing documentation which is just declare that something is true without explaining why it is true. So you end up in random PHP like land, when things just work like that okay.
This question was already answered 10 years ago in a completely different version of the programming language to the one you're using, and we know it doesn't work anymore, in fact hasn't for 8 years, but we're going to close it anyway because screw you.
Also you should be doing it in Rust anyway
Everyone knows that you convert people by sending a single priest and having him wave at you and say "ar warw". Then you get a different colored shirt and join the good side
I assume being blown up by a terrorist is not everyone's idea of a good time. Oh indeed anyones.
In what way am I wrong then?
Yeah. It is. Every design has assumptions and every design can be abused by those assumptions. I'd like to say it's not a failure in design but it's really just a failure of imagination. No one thought this would be an issue, turns out it is, so someone fixed it.
The problem is that not every system gets updated.
Apparently some phones have a totally isolated electrically separated microcomputer which is in charge of encryption and decryption. Your phone doesn't actually know how the encryption decryption is done because it's separated from the microcontroller.
Any attempts to modify the microcontroller or replace any of its components with more cooperative components, will result in all of the data being wiped. This is implemented at the firmware level with the instructions being in ROM.
There are attacks where rather than trying to crank the password you just capture the hash which is stored in memory somewhere and then using a tool that lets you bypass the standard login inject that hash into the app, totally bypassing the UI interface and the password hashing algorithm.
The app sees the hash is correct and isn't aware that the information has been input via nonstandard methods, and so allows access.
The attacker still doesn't have a clue what your password was, but they don't need to. Interestingly enough this means that every time they want access to your data they have to do this because they don't have a way of actually changing the password or finding out what it was.
Oh my god that drives me nuts. I haven't saved it so why is it still here?