simple solution
buy both domains and forward all incoming messages to abuse@nsa.gov. I'm sure that'd solve the problem pretty quickly.
38 publicly visible posts • joined 28 Sep 2020
this is 100% in relation to this video by youtuber "I did a thing"...
bored Australians seem to work faster than any military
Nope, I just installed the authenticator app ¯\_(ツ)_/¯
To head off any further inaccurate assumptions I will also state that I keep sole control of my mobile device, and practice good security hygiene, along with backups and fallbacks. You can be sensible and still like convenience.
Again though, my opinion is just that, my opinion :D
As someone who actively enabled passwordless auth on their Microsoft account - I'm an advocate for this.
Not only do I have to not worry about a password (even though I use 1password for everything else), it actively has 2FA built in: I log in > I get an auth prompt on my phone > I approve it > I have to select the correct number shown to me on my computer from the list > If I choose correctly it logs me in.
It's pretty simple and stops bots from trying to crack my password. If everyone else takes a leaf from the MS book, I'm here for it - one overarching auth platform.
But this is just one positive opinion against, I'm sure, plenty of people who would rather comment negatively than try :)
don't you know that all you need is wine and an obscure foss shim and you'll be just fine, everything runs perfectly on linux and you don't worry about spending loads of time to set anything up ever
/s in case it wasn't clear.
make mine a pinot >
For those interested in the details - it requires your *designated* contact to have two things:
1) An access key that is generated when you choose the contact (you are able to choose more than one). - presumably this is protecting your data.
2) Your death certificate.
The data is limited to iCloud stored data, and includes:
photos, notes, mail, contacts, calendars, reminders, iMessages, call history, iCloud Drive files, health data, voice memos, safari bookmarks/reading list, and your iCloud backups.
Excluded:
Licenced media, in-app purchases, payment info/apple pay, iCloud Keychain (inc. passwords).
You can choose to text message your designated user(s) a code, or print a copy to include in your estate documents. It *does not* require the user to have an iOS/MacOS device.
It's not just you. But you know what el reg's forums are like...
Micro$ofT = BaD!!11!
FBI = DoUbLE BaD11!
Therefore they must have gotten in, cloned all your "very interesting email" and let themselves out, rather than just deleting the web shell.
All hail linux ect. etc.
Nowhere in the article does it say that Apple actually made an offer and was rejected. Surely holding a meeting to see what the product is about, with the potential for it to lead to a purchase offer can't count as a failed aquisition attempt?
I'm curious to see how this plays out though. Apple aren't one for banishing people only to pick them up later at a discount - they're more of the subtle aquisition type.