from here and here (image source) |
Genealogy sites have already suffered data breaches in the past, and more are sure to be coming in the future. Any data that gets collected will eventually be breached.
from here and here (image source) |
Genealogy sites have already suffered data breaches in the past, and more are sure to be coming in the future. Any data that gets collected will eventually be breached.
foudn on Acid Cow |
It's not like a human bouncer can easily get rid of a mouse. We're not as well matched to that particular threat model as Elwood here.
from here and here (image source) |
There should be no shame in going back for 2nds or 3rds or 4ths or ... Well, maybe you're exceeding the limits of other peoples' hospitality, but no matter - how much you eat is nobody's business but your own. Protect your dietary privacy and sneak some extra helpings.
found on Reddit |
Is it an error? Is it for real? Do I want to find out the hard way? Nope. Consider me deterred.
from here and here |
I would love to see Apple strike a blow for privacy but I also admit that they are anti-competitive. If they harm the online ad ecosystem I won't shed a tear. Likewise if Facebook helps get Apple taken down a peg and weaken their stranglehold on their app store, I won't shed a tear then either.
found on Ebaum's World |
I like to think this might actually fool facial recognition systems. Not to the extent that they'll think you're the Tiger King or anything, but at least enough to think they see a face, and if it's not your real face then all the better.
from here |
I think it's safe to say that virtually no one saw spy vacs coming, at least not that way. Your threat model might have included the vacuum having a vulnerability that let people break into your phone or your network or something, but a device with no microphone listening into ambient sounds is definitely thinking outside the box.
It's also a pretty useless threat model to a certain segment of the population, but maybe nobody wants to hear what those folks are saying anyways.
Thanks to Graham Cluley for bringing attention to this new wrinkle in the threat landscape.
Product Page |
This, I think, is a good conversation starter. It's striking, and colourful, but what is it? It's a rainbow table, a staple of old-school password cracking. When someone asks what that weird symbol on your flask or laptop or whatever is, you can tell them about password cracking.
from here and here (image source) |
There's no way he's going to walk out of the store like that. Someone is going to notice the merchandise he's hidden under his hoodie. It's just too obvious.
found on Imgur |
That is quite a stark difference. Clearly she has a super power, and that power is disguise.
from here |
You'd think with all the extra free time people had this year they'd have finally worked out how to use a password manager to keep track of their passwords so they wouldn't need to use ridiculous ones like "123456" and "password" anymore.
found on Reddit |
Actually, if you read deeply enough into this it might be a good way to avoid surveillance - specifically talking someone else into doing the crime for you so that they get picked up on camera instead of you. If you just walk your own naked underage self into a video monitored business and rob the place, however, it's not going to work the way this describes.
from here and here (image source) |
This probably won't be effective unless it's at a considerable distance, because the quality is kind of low, and if you ever do drive it anywhere you're going to give away the game. Honestly, you might be better off with a camouflaged tarp that you can remove when you need to move the vehicle.
from here and here (image source) |
I feel confident that that gate will keep people out (or in) pretty effectively. How would you open it?
found on Acid Cow |
I've never encountered a freebie quite like this unlocked ATM, but now that I know it's a possibility I'll keep my eyes open.
from here (image source) |
That seems like a really good way to prevent the theft of your bumper, but it's not going to stop anyone from driving away in your car.
Product Page |
Surveillance is ubiquitous these days, but it's also discreet, so you might as well wear something to remind people that they're being watched.
from here and here |
It's hard to believe that they weren't trying to make a working exploit. It's not like it's an easy name for potential customers to deal with, it certainly wasn't going to bring in business.
found on Reddit |
Why shouldn't PINs present exactly the same problem as passwords? They're basically just really short passwords.
from here and here (image source) |
It turns out this is a very effective way of stopping a car from being driven away by either a car thief or the rightful owner.
A bike thief wouldn't have a problem with it, though.
found on Reddit |
With the kinds and quantities of incriminating evidence that Facebook and Instagram have on so many people, they could probably be just as effective as the FBI in many cases, and all their data was voluntarily provided.
from here and here (image source) |
Not only will this not stop computer viruses, I don't think this is going to do such a good job of stopping biological viruses either, and it's not terribly safe.
Don't try this at home.
from here and here (image source) |
Everything is covered quite effectively, but even if you did see something, whose something did you see?
found on Acid Cow |
from here |
The lesson we should all learn from Zoom is that it's not really end-to-end encrypted if a middleman holds the keys.
Product Page |
Product Page |
This shirt definitely has some sound advice on it. Sniffing networks doesn't harm your health and can theoretically lead to someone paying you money, whereas the other generally leads to you paying someone else for something that can harm your health.
from here and here (image source) |
The problem with using video game logic to keep things secure (besides the inaccuracies in video games) is the fact that games are designed so that you can win, so things like hidden doorways aren't actually hidden all that well.
This really will keep things secure from NPCs, though, because NPCs don't exist in the real world.
found on Reddit |
I'm all for making the scammers put way too much effort in for far too little reward.
from here and here |
found on Reddit |
from here (image source) |
You're not going to get very far in your defenses if you can't see all dimensions of the threat landscape.
foudn on LOL Snaps |
from here and here (image source) |
Not all threat models are created equal. Some are just plain useless. What's pictured above is not a realistic threat, it's not something you have to plan for. More likely it's an eccentric war museum or an attempt to help a coral reef grow. But people who aren't good at evaluating threat models could certainly look at it and think it represents an actual military force instead of a military farce.
from here |
found on Acid Cow |