I’ll see how the $50 AliExpress knock-off version works in a year or two
I’ll see how the $50 AliExpress knock-off version works in a year or two
Probably best to avoid systems with known deniable encryption methods, and keep your dummy data there. Then hide your secrets e.g. in deleted space on a drive, in the cloud, or a well-hidden micro-sd card. All have risks, maybe it’s best of all to not keep your secrets with you, and make sure they can’t be associated with you.
As referred in other comment, the counter counter is to just keep beating to get further keys/hidden data.
There are some cases involving plausible deniability where game theory tells you should beat the person until dead even if they give up their keys, since there might be more.
deleted by creator
It’s getting dark
The only theft going on is the ongoing theft from the public domain, due to corruption of copyright law by special interests enabled by law for hire. Your analogy is irrelevant as the marginal cost of operating a park for an extra visitor is not zero.
I will gladly take a position of moral superiority, because copyright has evolved from a very limited monopoly, intended to encourage creativity while balancing public access, into a licence for corporations to seek rent.
So, call it stealing if you like, I will sleep well tonight regardless.
But stealing is not owning so QED
Bankruptcy court?
If your business model needs undercover advocates to fake grassroots legitimacy you may have a problem.
If buying is not owning, copying is not stealing. Simple as that.
find -print0 | xargs -0 can handle spaces
Edit and you probably want xargs --exec instead of piping after
I use the native wireguard client on Linux
Gretchen, stop trying to make X happen. It’s never going to happen.
A single party can start a war. Stopping, however, …
There’s a story about trying to suppress an insurrection. You have ten insurgents. You kill five. The next day you have fifteen insurgents…
Literally mythical man month