🇨🇦

  • 3 Posts
  • 640 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle


  • Darkassassin07@lemmy.catoScience Memes@mander.xyzREVENGE
    link
    fedilink
    English
    arrow-up
    13
    arrow-down
    11
    ·
    15 days ago

    Maybe, but the homeless crackhead shambling through the lot at 3am like a zombie doesn’t give a fuck and will kick that thing as hard as he can muster.

    Move it anyway; at least it will have a chance instead of painting a massive target on it with those cones.


  • I’ve been looking for work lately and getting told the same thing by the employment offices around me (job search assistance).

    It feels so bizarre and pushy to email back after an application/interview. I showed up and did my part, the balls in their court now, I’m just waiting for a response. To reach out again seems like I’m leaning over their shoulder and asking ‘have you made a decision yet??? How about now, can I have a job now?’

    They already know what I want, what I can offer, and how to reach me. What more do they need?







  • Rebooting just seems like a very roundabout, slow and inefficient way to get back to that initial state you describe.

    It’s exactly what the reboot process is designed to do; return you to that fully encrypted pre-boot state. There would be no purpose to implementing a second method that does the exact same thing.


  • Much of the data on your phone, including critical information that’s required to run the operating system and make the device function, is fully encrypted when the device is off/rebooted.

    While in this locked down state, nothing can run. You don’t receive notifications, applications can’t run in the background, even just accessing the device yourself is slow as you have to wait for the whole system to decrypt and start up.

    When you unlock the device for the first time; much of that data is decrypted so that it can be used, and the keys required to unlock the rest of the data get stored in memory where they can be quickly accessed and used. This also makes the device more vulnerable to attacks.

    There’s always a trade off between convenience and security. The more secure a system, the less convenient it is to use.