Theyre not saying anything about reading the key off the phone. Brute force the key by trying every key against the encrypted data dump.
- 0 Posts
- 5 Comments
Joined 3 months ago
Cake day: April 8th, 2025
You are not logged in. If you use a Fediverse account that is able to follow users, you can follow this user.
buffing_lecturer@leminal.spaceto Privacy@lemmy.ml•Apple Gave Governments Data on Thousands of Push Notifications21·1 month agoDoes ntfy solve this problem?
What would you do differently? So I can benefit from your hindsight.
buffing_lecturer@leminal.spaceto politics @lemmy.world•Does everything feel broken but weirdly normal? There’s a word for that441·2 months agoHypernormalization
I think even if following the steps exactly there could still be burns. “a few minutes” is ambiguous and could be technically satisfied after just 3 minutes.