minus-squarebuffing_lecturer@leminal.spacetoPrivacy@lemmy.ml•[Deleted]linkfedilinkarrow-up14·5 days agoTheyre not saying anything about reading the key off the phone. Brute force the key by trying every key against the encrypted data dump. linkfedilink
minus-squarebuffing_lecturer@leminal.spacetoPrivacy@lemmy.ml•Apple Gave Governments Data on Thousands of Push Notificationslinkfedilinkarrow-up2arrow-down1·15 days agoDoes ntfy solve this problem? linkfedilink
minus-squarebuffing_lecturer@leminal.spacetoHolup@lemmy.world•Ee....vee?linkfedilinkarrow-up7arrow-down1·16 days ago linkfedilink
minus-squarebuffing_lecturer@leminal.spacetomemes@lemmy.world•There's gotta be a better waylinkfedilinkarrow-up7arrow-down1·16 days agoWhat would you do differently? So I can benefit from your hindsight. linkfedilink
minus-squarebuffing_lecturer@leminal.spacetoComic Strips@lemmy.world•Are IDEs really like this ?linkfedilinkarrow-up2arrow-down1·20 days agoThat is a pretty good way to look at it. linkfedilink
minus-squarebuffing_lecturer@leminal.spacetoA Boring Dystopia@lemmy.world•Uber to introduce fixed-route shuttles in major US cities designed for commuters | TechCrunchlinkfedilinkarrow-up0·1 month agoWhere? linkfedilink
Theyre not saying anything about reading the key off the phone. Brute force the key by trying every key against the encrypted data dump.