Because most people are trapped in an unjust system that fails to provide their basic needs. So we scratch and claw at each other for a bigger share, rather than battling the unjust system that is perpetuating itself and accelerating our demise.
Best definition of end to end encryption I heard 20+ yrs ago “It’s like transferring one million dollars in an armored car from your house to a homeless person on a park bench.”
Come join SANS Fellow Hal Pomeranz on an expedition into the "fileless" persistence mechanism of the Kovter malware in this special APAC webcast! sans.org/u/R9E@hal_pomeranz
Imagine in 2000 thinking Linux would never compete with Windows at home, but it’d run most mobile phones, much of the world’s infrastructure, and would make it to the desktop via Microsoft.
This should teach humility.
If an operation using these exploits was ever tumbled by an adversary, then they should have started the vendor notification process immediately. You must assume the exploit will be found and reverse-engineered.
We use lay flat bindings. We've had some defective ones from our printer. If your cover separates from your book it may be defective. Email info@nostarch.com with photos. If defective we'll replace it free. Please RT. nostarch.com/blog/lay-flat-b…
It doesn’t matter what browser, OS, computer, languages, processor, RAM, monitor, etc., that you use.
It’s what you do— with what you got.
The best hackers do the most with the fewest resources.