iMessage is encrypted in transit by default when talking to other iPhone users, and 95% of my contacts use iPhones. That is the ONLY reason I use an iPhone.
iMessage is encrypted in transit by default when talking to other iPhone users, and 95% of my contacts use iPhones. That is the ONLY reason I use an iPhone.
Only when they leak or get thrown out. If they’re still working they’re not leaking, but maybe drawing more power than needed.
It’s not a net loss. Renter’s pay can be used for maintenance or equity or anything else. Since houses don’t depreciate in this market and maintenance costs are not even close to rent, the landlord only gains.
Good and interesting question. I bet you could test it by using static (high entropy) as a background vs the control plain color.
You can’t independently verify without source code. Will it be published?
Most just don’t know how to properly file their W-4 to not have taxes withheld in the first place.
How do you do this? How do you calculate what to personally withhold and pay? Is it simply calculating through the income tax?
Company monopoly on air is an element of Total Recall (1990). Great Movie.
Ultimately, the question is: “What is the dollar a unit of?”. The answer is roughly “energy” in the physical sense, or effort/labor in more human language.
What I think is interesting is that then, the social and physical definitions of the word “power” collapse into the same thing; one with more “power” is able to expend more “energy”, the labor of others, in a shorter time.
If you’re really interested in the topic, read the book “Energy and Civilization: A History” by Vaclav Smil, published in 2017. It covers the efficiencies of tool use and how innovations in technologies that caused increased labor efficiency have catalyzed societal changes and revolutions, even going so far as to discuss GDP in units of Joules.
I’ve resolved to find and cut the antenna(s) when I have to buy a new car for this reason.
I second Matrix, though I’ve been waiting for e2ee direct p2p (the Dendrite project) do be worked on for a while. Having something like that, that’s truly decentralized while secure and hiding metadata where possible, would be a dream.
To help with this in the future, you can also create several fake results sharing your real name. Stuff like a blogger with one post not in your writing style, etc… This will dilute searches with disinformation. Removal of real data is important, but you can also confuse anyone looking.
An equally valid interpretation. 😊
Indeed. I serve the God of Comedy, bringer of Big HaHa 🫡.
Thanks, you’ve given some great suggestions!
Password Entropy = length * log2(possible_chars). So this would actually add 7*log2(10) => 23 bits of entropy, assuming the attacker knew that this section was numeric, or ~45 bits if they didn’t.
For anyone curious: Current best practice is a minimum of 100 bits, or 16 characters assuming only letters, numbers, and special characters. The recommended minimum bits increases every year with computing power.
Oh yeah that’ll do it.