How many hours of stored phone calls do you think the telcos keep on their systems so that anybody can re-play their voice conversations. share them with their friends, or just allow anybody online to listen in?
Please show me where I can listen in on your phone calls Koby? I mean, if you are still trying to equate telephone calls with social media.
Bravely bold Sir Koby
Rode forth from the internet.
He was not afraid to die,
Oh brave Sir Koby.
He was not at all afraid
To be killed in nasty ways.
Brave, brave, brave, brave Sir Koby.
He was not in the least bit scared
To be mashed into a pulp.
Or to have his eyes gouged out,
And his elbows broken.
To have his kneecaps split
And his body burned away,
And his limbs all hacked and mangled
Brave Sir Koby.
Luckily for me most of what i work on is compatibility layers and software controllers (drivers) so starting from scratch on my work isn’t make or break.
As opposed to porting someone else’s work to a new platform. I prefer my work be released unrestricted. I can’t do that by starting with someone else’s work under most of the copyleft licenses.
Hence my stance on the free as in freedom claim.
As you are restricted from placing less restrictions on derivative work.
That Anonymous Coward (profile), 25 Feb 2022 @ 2:00pm
Something something regulatory capture...
We might see tactical nukes used, but really the important thing is making sure we make sure copyright is okay.
Exactly this, it does not matter if it was encrypted, encoded, clear text, or in any other form, if it's data you don't want public you should not have let it outside your security boundary.
If' it werent for FB, YT, and many other sites and the idiots posting on them, I would Never laugh again.
Anyone remember when the Crooks were posting and showing off all their gains on FB, and finding out that Cops could ID and track them? Knock on the door and arrest them?
Anyone watch the Sparkle bombs set out for people to steal Amazon packages?
How about tracking Scammers that have people send them money with UPS?
HOW about Hackers hacking the OTHER hackers. remote view from their OWN SERVERS AND COMPUTERS? Then call them up and describe whats going on in the office the other hackers are sitting in, talk to them about the Girl next to them.
Looks like the highway patrol investigation found the guilty party after all, bet he's rather regretting setting them on the trail only to have it point right back to his office.
Still, this does nicely explain why he was so dedicated in blaming the reporters, with the blame right on his own IT team he must have figured that even the slightest amount of digging would lay the blame at his feet and so he tried to pre-emtpively shift it to someone else.
"A man once dreamed he was important. When he awoke, he no longer knew if he was a idiot dreaming he was a savior, or a jackass who had dreamed he was a smart."
common carriers offer basis services ,phone, telegraph, transport, theres
1000 s of apps ,theres dating apps for gay women,lgbt trans or gay men, the common carrier concept is a ploy to force social media to accept any user or any content even if it promotes hate speech or discrimination against minority groups.this includes spammers or trolls .theres plenty of conservative users on facebook, instagram and yourube
Apps and social media need to be able to moderate content and reject bad content ,block trolls to provide a safe or non threatening space for users
a law that treats tik tok youtube, dating apps, facebook as all the same
would be a disaster
I would also like to point out that the most common means of encoding binary data for sending files as an email attachment is base64.
Base64 is also widely used for sending e-mail attachments. This is required because SMTP—in its original form—was designed to transport 7-bit ASCII characters only. This encoding causes an overhead of 33–36% (33% by the encoding itself; up to 3% more by the inserted line breaks).
Mike Parson is a very bad governor who beieves that his own IT team's very bad coding practices should not be blamed, and instead that he can attack journalists who ethically disclosed the vulnerability as "hackers" rather than take even the slightest bit of responsibility.
✅ ~ % whereis base64 /usr/bin/base64
✅ ~ % uname -a Darwin macMini.flat 19.6.0 Darwin Kernel Version 19.6.0: Thu Jan 13 01:26:33 PST 2022; root:xnu-6153.141.51~3/RELEASE_X86_64 x86_64
So it appears that macOS has hacker tools built into it's OS. Good to know that macOS is now illegal in Parson's view.
(Also, can somebody explain how to create a proper MD code block on this site? It appears that 3 backticks nor 4 spaces seem to properly work. Inline code block works with a single backtick)
Even if it was encrypted, still doesn't explain why data on other teachers was being sent.
If it is being sent to the client (browser), it's going to get decrypted at some point. And if the web page itself is decrypting it on the client side, they've also (at some point) sent the key. Having sent the client both the encrypted data, and the key to everything, you expect the encryption to be worth anything at all?
They say it was "10 years old", so perhaps the site wasn't using HTTPS ... which is another strike against it. (The HTTPS-Everywhere extension was created in 2014, only a couple years after the "10 years", and HTTPS itself dates back to 1994...
I have One Simple Question for you based on your post.
Yes or no: Do you believe the government should have the legal right to compel any privately owned interactive web service into hosting legally protected speech that the owners/operators of said service don’t want to host?
On the post: Turns Out It Was Actually The Missouri Governor's Office Who Was Responsible For The Security Vulnerability Exposing Teacher Data
Re: a Republican only makes an accusation
Ah! To paraphrase a previous Funny winner, "Projecting so hard they can see their own face on Uranus"
On the post: Turns Out It Was Actually The Missouri Governor's Office Who Was Responsible For The Security Vulnerability Exposing Teacher Data
Re:
There are, or at least used to be, browser extensions that would en/de-code base 64 and usually a host of other things.
Of course, any bloody email client would decode it transparently.
On the post: Why It Makes No Sense To Call Websites 'Common Carriers'
Re: Loitering Signal Association
How many hours of stored phone calls do you think the telcos keep on their systems so that anybody can re-play their voice conversations. share them with their friends, or just allow anybody online to listen in?
Please show me where I can listen in on your phone calls Koby? I mean, if you are still trying to equate telephone calls with social media.
On the post: Why It Makes No Sense To Call Websites 'Common Carriers'
Re: Loitering Signal Association
Bravely bold Sir Koby
Rode forth from the internet.
He was not afraid to die,
Oh brave Sir Koby.
He was not at all afraid
To be killed in nasty ways.
Brave, brave, brave, brave Sir Koby.
He was not in the least bit scared
To be mashed into a pulp.
Or to have his eyes gouged out,
And his elbows broken.
To have his kneecaps split
And his body burned away,
And his limbs all hacked and mangled
Brave Sir Koby.
On the post: We Stand On The Precipice Of World War III, But, Sure, Let's All Talk About The DMCA And 'Standard Technical Measures'
Thanks, Congress. @@
On the post: US Copyright Office Gets It Right (Again): AI-Generated Works Do Not Get A Copyright Monopoly
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
Luckily for me most of what i work on is compatibility layers and software controllers (drivers) so starting from scratch on my work isn’t make or break.
As opposed to porting someone else’s work to a new platform. I prefer my work be released unrestricted. I can’t do that by starting with someone else’s work under most of the copyleft licenses.
Hence my stance on the free as in freedom claim.
As you are restricted from placing less restrictions on derivative work.
On the post: We Stand On The Precipice Of World War III, But, Sure, Let's All Talk About The DMCA And 'Standard Technical Measures'
Something something regulatory capture...
We might see tactical nukes used, but really the important thing is making sure we make sure copyright is okay.
On the post: Turns Out It Was Actually The Missouri Governor's Office Who Was Responsible For The Security Vulnerability Exposing Teacher Data
Re:
Exactly this, it does not matter if it was encrypted, encoded, clear text, or in any other form, if it's data you don't want public you should not have let it outside your security boundary.
On the post: Censr: Alt-Right Twitter Alternative Gettr Bans Posts, Accounts Calling One Of Its Backers A Chinese Spy
Any service or whatever that claims they're pro free speech or pro freedom of expression is quite literally full of shit.
I'm honestly surprised people haven't learned that by now.
On the post: Turns Out It Was Actually The Missouri Governor's Office Who Was Responsible For The Security Vulnerability Exposing Teacher Data
If'
If' it werent for FB, YT, and many other sites and the idiots posting on them, I would Never laugh again.
Anyone remember when the Crooks were posting and showing off all their gains on FB, and finding out that Cops could ID and track them? Knock on the door and arrest them?
Anyone watch the Sparkle bombs set out for people to steal Amazon packages?
How about tracking Scammers that have people send them money with UPS?
HOW about Hackers hacking the OTHER hackers. remote view from their OWN SERVERS AND COMPUTERS? Then call them up and describe whats going on in the office the other hackers are sitting in, talk to them about the Girl next to them.
On the post: Turns Out It Was Actually The Missouri Governor's Office Who Was Responsible For The Security Vulnerability Exposing Teacher Data
Imagine that...
Looks like the highway patrol investigation found the guilty party after all, bet he's rather regretting setting them on the trail only to have it point right back to his office.
Still, this does nicely explain why he was so dedicated in blaming the reporters, with the blame right on his own IT team he must have figured that even the slightest amount of digging would lay the blame at his feet and so he tried to pre-emtpively shift it to someone else.
On the post: Turns Out It Was Actually The Missouri Governor's Office Who Was Responsible For The Security Vulnerability Exposing Teacher Data
Re:
"A man once dreamed he was important. When he awoke, he no longer knew if he was a idiot dreaming he was a savior, or a jackass who had dreamed he was a smart."
On the post: Censr: Alt-Right Twitter Alternative Gettr Bans Posts, Accounts Calling One Of Its Backers A Chinese Spy
You're free to run your mouth on Gettr with copious exceptions.
So not quite free.
It's just another example of thinking you can do it better, and failing as usual.
On the post: Why It Makes No Sense To Call Websites 'Common Carriers'
common carriers offer basis services ,phone, telegraph, transport, theres
1000 s of apps ,theres dating apps for gay women,lgbt trans or gay men, the common carrier concept is a ploy to force social media to accept any user or any content even if it promotes hate speech or discrimination against minority groups.this includes spammers or trolls .theres plenty of conservative users on facebook, instagram and yourube
Apps and social media need to be able to moderate content and reject bad content ,block trolls to provide a safe or non threatening space for users
a law that treats tik tok youtube, dating apps, facebook as all the same
would be a disaster
On the post: Turns Out It Was Actually The Missouri Governor's Office Who Was Responsible For The Security Vulnerability Exposing Teacher Data
Email attachments are illegal now too!!
I would also like to point out that the most common means of encoding binary data for sending files as an email attachment is base64.
Source: https://en.wikipedia.org/wiki/Base64
On the post: Turns Out It Was Actually The Missouri Governor's Office Who Was Responsible For The Security Vulnerability Exposing Teacher Data
Re: hacker!
RmkgeW91IGNhbiByZWFkIHRoaXMseW91IGFyZSBzaXR0aW5nIHRvIGNsb3NlIHRvIHRoZSBzY3JlZW4=
translation
Fi you can read this,you are sitting to close to the screen
Yes I did it on propose.
On the post: Turns Out It Was Actually The Missouri Governor's Office Who Was Responsible For The Security Vulnerability Exposing Teacher Data
So here goes...
✅ ~ % echo TWlrZSBQYXJzb24gaXMgYSB2ZXJ5IGJhZCBnb3Zlcm5vciB3aG8gYmVpZXZlcyB0aGF0IGhpcyBvd24gSVQgdGVhbSdzIHZlcnkg YmFkIGNvZGluZyBwcmFjdGljZXMgc2hvdWxkIG5vdCBiZSBibGFtZWQsIGFuZCBpbnN0ZWFkIHRoYXQgaGUgY2FuIGF0dGFjayBq b3VybmFsaXN0cyB3aG8gZXRoaWNhbGx5IGRpc2Nsb3NlZCB0aGUgdnVsbmVyYWJpbGl0eSBhcyAiaGFja2VycyIgcmF0aGVyIHRo YW4gdGFrZSBldmVuIHRoZSBzbGlnaHRlc3QgYml0IG9mIHJlc3BvbnNpYmlsaXR5Lg== | base64 -d
Mike Parson is a very bad governor who beieves that his own IT team's very bad coding practices should not be blamed, and instead that he can attack journalists who ethically disclosed the vulnerability as "hackers" rather than take even the slightest bit of responsibility.
✅ ~ % whereis base64
/usr/bin/base64
✅ ~ % uname -a
Darwin macMini.flat 19.6.0 Darwin Kernel Version 19.6.0: Thu Jan 13 01:26:33 PST 2022; root:xnu-6153.141.51~3/RELEASE_X86_64 x86_64
So it appears that macOS has hacker tools built into it's OS. Good to know that macOS is now illegal in Parson's view.
(Also, can somebody explain how to create a proper MD code block on this site? It appears that 3 backticks nor 4 spaces seem to properly work. Inline code block works with a single backtick)
On the post: Turns Out It Was Actually The Missouri Governor's Office Who Was Responsible For The Security Vulnerability Exposing Teacher Data
Re:
Even if it was encrypted, still doesn't explain why data on other teachers was being sent.
If it is being sent to the client (browser), it's going to get decrypted at some point. And if the web page itself is decrypting it on the client side, they've also (at some point) sent the key. Having sent the client both the encrypted data, and the key to everything, you expect the encryption to be worth anything at all?
They say it was "10 years old", so perhaps the site wasn't using HTTPS ... which is another strike against it. (The HTTPS-Everywhere extension was created in 2014, only a couple years after the "10 years", and HTTPS itself dates back to 1994...
On the post: Why It Makes No Sense To Call Websites 'Common Carriers'
I have One Simple Question for you based on your post.
Yes or no: Do you believe the government should have the legal right to compel any privately owned interactive web service into hosting legally protected speech that the owners/operators of said service don’t want to host?
On the post: Turns Out It Was Actually The Missouri Governor's Office Who Was Responsible For The Security Vulnerability Exposing Teacher Data
oh god, I fell into a hole and now it's suddenly 2 September 2000
Next >>