

Yeah the government has an institutional thing I forget what it is called, with massive amount of known exploits. That’s not backdoors. A backdoor is a “planted” exploit, not a discovered exploit. It makes no sense to call all exploits backdoors.
Yeah the government has an institutional thing I forget what it is called, with massive amount of known exploits. That’s not backdoors. A backdoor is a “planted” exploit, not a discovered exploit. It makes no sense to call all exploits backdoors.
Why? I am trying to understand what you mean so I can change my opinion. I’m not changing it because you are fuming and escalating the aggression, in fact, that has the exact opposite effect
Excuse me? Are you saying using guard discovery is a backdoor someone gave to the government? I mean, you can think whatever, but the technology isn’t really… backdoorable? It doesn’t make sense in the context. Where will the backdoor lead? It has no where to go.
Backdoor access to what?
Several. Probably dozens
I just didn’t understand. Ethics and police in the same post? Where? How? Why and what does that have to do with your supposed experience with those in law?
Cool, it makes sense I guess. But why would other languages not also be succeptible to memory injections?
Could you explain how their language choice affects the security of the software? Because it’s open source and easier to find cracks?
Shudders man, think of the implications… What if it was aliased or something
No I for sure complain, but for date bugs… I’ll be forgiving
I don’t see the difference
Sorry, but I already super enjoy tree style tabs, even though it was kind of a mess to configure
Okay thank you. I feel like it’s a lot of information here that is about, like you say, how complicated abstract and advanced it is, with the devices, kernel representations and mount points.
There must be a better way of just explaining how the root fs works, because I still don’t understand anything.
It really doesn’t feel like comparing it to windows gives any favours though, maybe explain use cases, like where would the user save downloads, where would you install apps?
I’ve used Linux a little. Right now it’s modernized enough for me to not learn the file system. But I remember in old times when I ran Ubuntu I just crammed files in a folder and struggled a lot with it
He didn’t imply that, he said he wanted to format C:\
Why is it oversimplifying to say the disk will be called / in Linux?
No system can be proven to have no exploits, but a backdoor is when there is a hidden prepared exploit planted on the inside (in this case presumably because they were funded by the government they assume they would get this in return, even though if that was the case they would do a crypto transaction and not openly fund them)