![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://beehaw.org/pictrs/image/7a17afb3-71f4-4ef1-a5ce-d2975ba46c88.png)
deleted by creator
Hi guy
deleted by creator
It’s not stealing.
It is returning to us what was stolen.
Also, the Weston family live in a literal castle that was built for the royal family.
To the gallows with them.
Pooh bear says Think different.
Keep corporations as persons - restore public execution. If a man with the mind of a 10 year old can be executed, so can executives.
Almost as if there’s a tendency for people who seek positions of power to abuse that power.
The first two words of the description might provide a hint.?
Better than self flatulating
The fuck? How the fuck did that happen? I didn’t even fucking … That’s not what I fucking wrote. Wtf? Fuck is this? Fuck this shit! Oh, fuck. Fucking mother fuck. Stupid fucking auto complete.
My roommates probably think this is a religious mantra by now.
As a user, I sometimes do everything I can to see what breaks a system. (Often unintentionally)
Then, I don’t do those this things.
(Learning permissions on Linux was a great way to destroy a system. Eg “sudo chown -R user:user /” didn’t work as I first thought)
They then used an even larger mouse to drag the actual computer to the garbage bin.
The garbage bin then caught fire.
This is the origin of the dumpster fire meme.
I originally included the words “assuming random” to the post. Why I removed it? I guess for dramatic effect. You are correct. Permutations of dictionary words are relatively trivial for a decent program. But, increasing the length and the addition of special characters adds a nontrivial exponential increase in time, wouldn’t it?
Fun fact: it would take about 37 billion years on average (at current (known) tech) to brute force a 16 character alphanumeric password which uses uppercase ie. using at least one of each of a-z,A-Z,0-9
Adding special characters would not make it easier. A trillion years seems like a long time. (Unless your password is ThisIs4Password!)
https://www.komando.com/wp-content/uploads/2021/03/Passwords-chart-970x510.jpg
I think he was a senior contributor for the underground cracker mag 1600 back in the late 80s.
They called em zines.
Then:
A wireless/ethernet router as access point, a personal proxy server, or pihole, between your devices and theirs. Or, if possible your own modem and router.
[ISP modem/router]<–LAN–>[personal wifi router]<wifi>[cheap pc proxy @ 192.168.x.x]<wifi>[all your devices]
Proxy could be ssh(socks5), tor, shadowsocks (not microsocks), dnscrypt, tinyproxy, nekobox, whatever. They’d all have the same internal address from the proxy (if set up that way) and then again one address from the router to their device. (Router and proxy order could be reversed : or just router for some basic device identity privacy - it doesn’t encrypt your data though. An encrypted proxy will. And tor or a VPN will mask your external ip) Some proxies/VPN are more secure than others.
And,RTFM. A bad configuration can be worse than no configuration.
There is none. This is a personal project. It has been long before brave. The source code is there. All previous results are there. All methods used are there. They make it well known their current employment.
Oh, did I mention you can run the same tests because the whole thing is OPEN SOURCE.?
Well, first, let’s stay on the topic of fact versus your possible issue of possible conflict.
K thx bye.
And yet the results are still fact and brave still isn’t the best.
A) B) n B)