• 0 Posts
  • 40 Comments
Joined 1 year ago
cake
Cake day: July 6th, 2023

help-circle
  • Did you not read anything I wrote?

    And no, that isn’t likely the path for stolen phones,especially when it’s a theft of opportunity by someone looking to feed a drug habit. They aren’t thinking about going to a fence who can give them what the phone is worth at that level of the chain.

    As I said in another comment, the locks both apple and android put in years ago had a major impact on the theft of phones. It’s pointless to steal them unless it’s part of a larger operation or you’re trying to get a phone that’s unlocked so you can siphon money from someone instead of just reselling the phone.










  • Sounds like you don’t understand tech at all. Some of us have been using smart phones since palm and blackberry. Earlier versions of Android didn’t need the confirmation at all, assuming that it was defaulted to file access.

    I’ve been android since the beginning and my last few phones (all pixels) I don’t remember having to approve the usb connection after the first time.

    Can you plug a random phone into a pc and access files? Probably not.

    Can you plug your own phone into a pc it’s been connected to prior and access files even with a broken screen? More likely yes, than no.

    You and the other minions downvoting me should try reading my entire comments as many times ad needed for you to grasp the very basic concepts at play.

    And to repeat. You have no idea how the file system on android works. You most definitely can delete/backup/etc the photos, screenshots, etc on the phone via USB. You can not easily access app data as thats encrypted and stored elsewhere.

    You kids need to get off the internet before you hurt yourself.

    This is starting to feel more and more like reddit, that’s not a good thing.





  • antizero99@lemmynsfw.comtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    1
    ·
    edit-2
    8 months ago

    I thought this fud had been debunked.

    Are you accounting for the energy used to extract the oil, the energy used to transport it to a refinery, the energy used to refine it, the energy used to transport it to the gas station and then the energy used to pump into your car?

    There is no way that the carbon needed to create a battery is more over the decades of life for said battery along with the renewable used to charge it, than the ongoing carbon released to keep ice engines running.

    There is also a move to power battery facilities with renewables and when we reach a point where batteries are being recycled it gets even better.

    Don’t let perfect be the enemy of good. We have to move past ice engines and right now ev is our best option.






  • That’s not how that works. Torrent has been around for decades and none of that actually happens. None of that will ever happen and couldn’t actually be enforced even if it did.

    I’m not sure some of you here actually understand how this tech or the world at large actually functions. Plenty of files are shared p2p that aren’t under copyright and it would be damn near impossible to limit people’s ability to connect p2p with others without fundamentally changing how the entire internet is connected and functions.

    I’d suggest you look up concepts like zero knowledge encryption. I’d also suggest you look at VPN providers that claim to not keep any logs at all along with proper encryption. I’d also suggest that you look into the number of jurisdictions around the world who don’t give a flying fuck about the dmca.


  • Actually, no. Even if they trace it back to the provider, if said provider is running little to zero logs and proper encryption, there is no way for the provider to know who is doing the downloading of anything.

    It’s also not the movie/game companies doing anything. There are companies that monitor p2p for specific files for TV shows, movies, games, etc and then automatically send a boilerplate cease and desist to whoever owns any ip addresses for said files. Some isps like Google fiber (at one point) just ignored these requests and didn’t pass it on to the end user. Every other isp including VPSs, seedboxes, etc will autoforward the dmca notice and if you rack up enough they will fire you as a customer.

    I suggest you and others here check out proton, they have a ton of servers including ones that support p2p. They don’t and can’t tell who is transferring what. If you do a ton of downloading of pirated content, I’d also suggest setting up even a basic seedbox. The one I am currently using takes crypto and doesn’t need any info aside from an email address. They will forward dmca notices and the auto delete the offending content after about 12 hours but if you restart the torrent you can download it again if needed and you can then let it seed for as long as you want.