- Do you know anybody from “Ohio”?
- Have you ever been to “Ohio”?
- Do you know anybody who has ever been to “Ohio”?
I’m an electrical engineer living in Los Angeles, CA.
Rarely. A good intro gives me a moment to set aside real-life worries and get into the right mindset to enjoy the show. TNG, DS9, VOY, and SNW are all bangers.
LIFE BEFORE HEARING AID: hog cranking intensifies
LIFE AFTER HEARING AID: HOG CRANKING INTENSIFIES
Good meme, but how is this science?
Orcas (so called “killer whales”) aren’t whales at all, they’re actually dolphins.
Andor belongs on this list.
Every time I see “lichess”, it makes me think about “lich-ess”, i.e., a female undead wizard.
Florida Man strikes again.
Freedom sounds intensify
AOC for President.
I assume this guide is for engaging the F-117 in midair hand-to-hand combat after you’ve leapt aboard. But in that case, where are you supposed to get dirt? Bring it with you, like some kind of peasant?? Just use your sword like a normal ninja.
LOOK WHAT THOSE GITS NEED TO MIMIC A FRACTION OF OUR POWER.
Sadly, Firefox mobile got rid of about:config, and I can’t find any relevant options in the regular settings.
Apparently, 78 or 81 is a perfect age to run for President.
You can disable this “feature”:
Visit about:config
Set “dom.private-attribution.submission.enabled” to false
Sure, but there’s still no excuse for “store the password in plaintext lol”. Once you’ve got user access, files at rest are trivial to obtain.
You’re proposing what amounts to a phishing attack, which is more effort, more time, and more risk. Anything that forces the attacker to do more work and have more chances to get noticed is a step in the right direction. Don’t let perfect be the enemy of good.
No, defense in depth is still important.
It’s true that full-disk encryption is useless against remote execution attacks, because the attacker is already inside that boundary. (i.e., As you say, the OS will helpfully decrypt the file for the attacker.)
However, it’s still useful to have finer-grained encryption of specific files. (Preferably in addition to full-disk encryption, which remains useful against other attack vectors.) i.e., Prompt the user for a password when the program starts, decrypt the data, and hold it in RAM that’s only accessible to that running process. This is more secure because the attacker must compromise additional barriers. Physical access is harder than remote execution with root, which is harder than remote execution in general.
IF YOU DON’T RULE AND STONE, YOU AIN’T COMING HOME!