![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
Of course it’s stealing. But they didn’t break in.
Hacking = breaking in
Data breach = stealing stuff
Of course it’s stealing. But they didn’t break in.
Hacking = breaking in
Data breach = stealing stuff
For normal users with a sufficient amount of RAM, is there any real reason to even have a swap file or swap partition? Or why shouldn’t they have one and set the swappiness to zero?
Breaking off diplomatic relations is usually a very extreme measure. In the tradition of diplomacy, it is the most serious action a country can take to express its disapproval of another besides declaring war. It might be justified but it won’t be taken because the Chinese government offends extremely easily and would retaliate in kind with trade sanctions and embargoes.
If world leaders actually had the stock to stand up to China, their next move would be to say “One more fuck up and we recognise the Republic of China on Taiwan as the legitimate government of China”.
Daily reminder to check out some local credit unions. They offer the same services as banks and are run as a not-for-profit charity. Most US credit unions are members of the Co-Op ATM network which allows you to use any other credit union’s ATMs for no fee as if they were your own. Some also reimburse out-of-network ATM fees and even pay interest on checking/current accounts. Their fees are usually the same or lower than banks.
Finally, something for the Americans to laugh at Europeans about
Intelligence agents usually enter on diplomatic passports solely so that their country can claim diplomatic immunity to fish them back out.
Well, perhaps not the ones that look uncanny then.
To elaborate more, I think that it’s because if humans have an aversion to other hominids and corpses, we wouldn’t try to waste resources attempting to breed with them.
I’m not talking out of my arse here either. I don’t work in security specifically but I’ve got a CS degree as well and it contradicts my understanding of how those terms are generally used. This is an open API endpoint, equivalent to leaving the garage door open.
But the distinction is usually unimportant. A security hole is a security hole regardless of what you call it.
I’m not someone who works on the practical side of security, but as a computer scientist, I do not agree that it is “hacking”. That contradicts my understanding of “hack” versus other types of exploits, but you are correct that the distinction is generally not that important. A security problem is a security problem regardless what it’s called
This gets posted a lot, but nobody ever seems to post what the thing was.
The answer is probably “other hominids”. Humans (Homo sapiens specifically) co-existed with them for a long time and competed with them over resources.
Edit: and the genetically deformed (with whom it would be beneficial to not breed, at least from an evolutionary standpoint) and corpses or people with disease
It is a vulnerability, but exploiting that vulnerability is not generally considered by security experts to be “hacking” in the usual meaning of that term in academic settings. Using an open or exposed API, even one with a sign that says “don’t abuse me”, is generally not considered hacking.
Please provide a link to whatever source claims this.
I hold a computer science degree and this contradicts the definition of “hack” versus “exploit” used in academic settings.
They did not do it by manipulating code. This wasn’t the result of a code vulnerability. If you leave the door wide open with all your stuff out for the entire neighbourhood to see, you can’t claim you were “broken into”. Similarly, if you don’t secure your endpoints, you can’t claim you were “hacked”.
With due respect, you are wrong.
hack
…
- (transitive, slang, computing) To hack into; to gain unauthorized access to (a computer system, e.g., a website, or network) by manipulating code
Hacking means gaining unauthorized access to a computer system by manipulating or exploiting its code.
You are correct, I replied to the wrong comment
Authoritarian laws go both ways. The next right-wing government would use it to imprison their political rivals on trumped-up charges.
If such a law had existed in the US, for example, Trump would have used it to throw everyone who denied that the 2020 election was rigged in jail
The junta will be in deep shit if or when the National Unity Government decides to issue its own currency to compete with the junta-issued Burmese kyat. Especially if that currency is backed with USD or some other hard currency or resources.
The scenario you described would not be breaking in.
Terms and conditions being agreed to are not relevant for this purpose. An exposed API is one that is welcome to be exploited. If you’re not requiring an API key, you’re essentially saying “This API is free for anyone to use” for security purposes, regardless of what you say in the terms and conditions.