Welcome to the club :)
Welcome to the club :)
Safe gun handling and storage practices ensure that, in the event of an emergency (like a home invasion), authorized people can readily access the weapons that you have stored. Firearms have no value for home defense if they require the owner to be physically present when they’re accessed… home invaders are not going to wait for your mother to drive home and open the gun safe.
This wasn’t a minor child, or some random person breaking into her house to steal firearms. It is perfectly reasonable to store weapons and allow the adults who live in the household to have access to them for emergencies.
The person who is in the wrong here is the man who took weapons into a public place and started shooting.
It is not enough to lock the phone.
An advanced attacker that has access to forensic imaging tools can pull data off of your phone as long as it has been unlocked the first time after boot.
There are some models and some OSs (like Graphene on the newest Pixels) that are safe, for the time being, in AFU mode. You still want to power the phone off if you have the chance.
In your friend’s situation, his phone can be powered, isolated from RF to prevent remote wiping and kept in a lock state in order to preserve the keys in memory until an exploit is found for that model. If the OS automatically reboots after 3 days, it prevents this kind of attack.
You want to do this even with custom roms.
Having your phone automatically go into the BFU state ensures that there’s only a small window for a thief to extract data from your phone.
If you ever think your phone is about to be stolen or seized you want to power it off for this exact reason.
That doesn’t mean that people are entitled to invent an alternate reality.
It’s one thing if there was any evidence to the contrary, but to just assume that they’re lying without any evidence is just social media brainrot
Of course, but fight them with facts.
Misinformation is in nobody’s best interest.
If you’re using KDE, look at KDE Connect: https://community.kde.org/KDEConnect
That’s why we all check for creepers hiding on our roof before we go outside…
Important to point out that it wasn’t her service weapon. An officer allowing their service weapon to be used by others would be an additional serious violation of law.
This was a weapon that she purchased from the Sheriff’s office when they were upgrading gear. It was, at one point, her service weapon but at the time of the shooting it was just a personally owned firearm.
It’s an important distinction since this kind of misinformation implies that she was careless in securing her service weapon.
Her son was an adult and had legal access to a legally owned firearm and chose to kill people. Trying to make it about his mother because she’s a cop is a pointless distraction.
Source: Public statements by Leon County Sheriff Walt McNeil
The CVE system protects everyone that uses computers. It is a public service that forms the core of cybersecurity in the US and many other places. It does not cost the database any more money if people use it to provide services to clients.
Letting a private corporation take it over and put it behind a paywall now means that security, like so many other things, will only be available to people with money. It will make software and hardware more expensive by adding yet another license fee or subscription if you want software that gets security updates.
In addition, a closed database is just less useful. This system works because when one person notifies the system of an exploit then every other person now knows. That kind of system is much higher quality if you have more people that are able to access it.
An industry being created and earning money by providing cybersecurity services shows how useful such a system is for everyone. There are good paying jobs that depend on this data being freely available. New startups only need to provide service, they don’t need to raise the funds to buy into the security database because it is a public service. They also pay taxes (a significant amount if they’re charging $30,000 per audit), more than enough profit for the government to operate a database.
Oh yeah, I donate whole blood too. There are legit places that are collecting blood in order to save lives.
But the plasma places are basically milking people to make cosmetics.
You get paid because they’re selling the plasma to companies who make retail products with it.
It was DNS
Otherwise I think that the idea of deleting all IP laws is just wishful (and naive) thinking, assuming people would cooperate and build on each other’s inventions/creations.
Given the state the world is currently in, I don’t see that happening soon.
There are plenty of examples of open sharing systems that are functional.
Science, for example. Nobody ‘owns’ the formulas that calculate orbits or the underlying mathematics that AI models are built on like Transformer networks or convolutional networks. The information is openly shared and given away to everyone that wants it and it is so powerful it has completely reshaped society everywhere on the Earth (except the Sentinel Islands).
Open Source projects, like Linux, are the foundation of the modern tech world. The ‘IP’ is freely available and you can copy or modify it as much as you’d like. Linus ‘owns’ the Linux project but anyone is free to take a copy of the Linux source code and modify it to whatever extent that they would like and form their own project.
Much of the software and services that people use are built on top of open source tools made by volunteers, for free; and most of the useful knowledge and progress for human society results from breakthroughs made in the sciences, who’s discoveries are also free and openly shared.
To me it was the hypocrisy
Meanwhile, I just threw an Ethernet cable out my window to connect to the Starlink dish.
(Temporary until I can remove some trees for clear line of sight)
Carved into the Supreme Court building:
He thought you’d never ask
I read it as “This is a silly Android thing that I don’t have to deal with because I use custom roms”.
I use Graphene and use this feature, but I can understand why it would seem silly to some people and I can think of use cases where you wouldn’t want it to happen (like using your phone as a security device with Haven (https://github.com/guardianproject/haven)) installed.
Most Android users don’t understand the BFU/AFU states and the security implications, it is good that default android is including a sane security default that’ll be pushed out to the standard Android users.