They may already have your data today but as soon as you can cut off pipelines that data starts getting stale.
They may already have your data today but as soon as you can cut off pipelines that data starts getting stale.
🐶:
🐱:
Salmon
Fuscia the dye
Fuscia the flower on the stem.
foul harlot smacks of Tiny Tina’s Assault on Dragon Keep
In Maya / Gaige runs, I would hear the knights orbed (phaselocked) by Maya exclaim:
Release me you Hellspawn temptress!
And I, playing Gaige would feel jealous that they wouldn’t call me a Hellspawn Temptress.
Also among their lines for Maya:
The harlot has me in her clutches!
The succubus goes for thy soul!
The hussy has me in her spell!
When I summon Deathtrap, they cry The wench summons her foul spawn!
Why am I a lowly wench when Maya is a Hellspawn Temptress!?
I WANT TO BE A HELLSPAWN TEMPTRESS!
Yeah, I claimed it was a plausible rumor, and given Win10 and Win11 are already spyware and resistant to end-user full control, I already have strong cause to distrust Microsoft, which is what I said.
So chill your reactor before it melts down. Unless you want a block, because this is how you get a block.
You have trustworthy sources to indicate it’s a bullshit conspiracy theory? Cite them!
Otherwise you can express your skepticism without being hostile. Thanks.
What I heard (on here, and I hope it’s a vicious rumor) is that TPM 2.0 comes with backdoors accessible to Microsoft via the OS so that a significant chunk of the computer belongs to Big MS and not to the end user, and it will squeal and cause problems if the end user tries to take it back.
The whole point of TPM 1.0 hypothetically was to allow a larger secondary encryption key of a device to be accessible only by a small user-provided key (say a four-digit PIN), and requiring use of the key-query software to run to get the secondary key. A limited number of chances with longer delays with each wrong answer heightens security.
But this pissed off government law enforcement across the world, who want backdoors for when they want to crack the phone of a very important criminal.
It would be nice if Apple, Google and Microsoft had more respect for their end users than they do national and corporate institutions, but we know this isn’t really the case, so it’s at least plausible that TPMs 1.0 or 2.0 come pre-backdoored. It doesn’t hurt that this is exactly what FBI and NSA want even though (Pre-9/11 and Pre-PATRIOT) NSA is supposed to be assuring that no-one, not even police can crack our secure communication protocols.
Despite efforts to look into it, I’ve yet to get an answer I can fully trust whether or not they are backdoored. But since Microsoft is notorious for exactly this kind of bullshit since the 1980s, I assume it’s true that TPMs are backdoored until I find convincing information otherwise.
Trump and Musk don’t want employees or workers, they want courtiers.
According to the US, torture is legal when it’s done by the US, which is a single example of how the federal US law does not reflect what is right, what is good, what is just.