• 0 Posts
  • 589 Comments
Joined 2 years ago
cake
Cake day: December 29th, 2023

help-circle




  • that’s about phones in general… they mention iphone once, and that’s about the 1 phone that led to them catching the criminals (which i’d say is a check in the box of “stealing iphones is useless”)

    iphones in apple stores as display models are not standard iphones: they lock down and turn themselves into only a tracker the instant they leave the apple store

    and it’s basically useless to steal an iphone in most cases anyway, because an iphone gets registered to an apple account, and if a phone is already registered you just can’t use it

    even parting it out the huge majority of parts - especially anything even a little bit expensive - has essentially DRM on it that talks to iOS… when you add a genuine apple part to an iphone, iOS checks to see if it’s already been registered to another phone and just won’t proceed with stolen parts

    the best you could do is use it or the parts as a prop in some secondary scam




  • but that’s a compromise… it’s not categorically better

    you can’t run a bank like you run distributed instances, for example

    services have different uptime requirements… this is perhaps the first time i’ve ever heard of signal having downtime, and the second time ever that i can remember there’s been a global AWS incident like this

    and not only that, but lemmy and every service you listed aren’t even close to the scale of their centralised counterparts. we just aren’t there with the knowledge for how to build these services to simply say that centralised services are always worse, less reliable, etc. twitter is the usual example of this. it seems really easy, and arguably you can build a microblogging service in about 30min, but to scale it to the size that it handles is incredibly difficult and involves a lot of computer science (not just software engineering)




  • that’s pretty disingenuous though… individual lemmy instances go down or have issues regularly… they’re different, but not necessarily worse in the case of stability… robustness of the system as a whole there’s perhaps an argument in favour of distributed, but the system as a whole isn’t a particularly helpful argument when you’re trying to access your specific account

    centralised services are just inherently more stable for the same type of workload because they tend to be less complex, less networking interconnectedness to cause issues, and you can focus a lot more energy building out automation and recovery than spending energy repeatedly building the same things… that energy is distributed, but again it’s still human effort: centralised systems are likely to be more stable because they’ve had significantly more work put into stability, detection, and recovery


  • to really hammer home this “many ways to hide”: the PDF is kinda just like a container… it contains other things like images (the patterns for example)… these patterns are probably vector graphics (made up of lines rather than pixels)… this means you can magnify them basically infinitely… and they can contain transparent lines and all sorts of things. they could easily embed that same text in the SVG image, at tiny scale (less than a pixel at 100% scale), and make it transparent… no PDF editor is going to touch the image data: it simply doesn’t really understand it to that degree - it’s an image; not a PDF after all… so that information will remain even after you’ve removed all visible/reasonable marks

    this is just 1 example of practically infinite places it could be - and remember, this text is just lines in an image! it’s not like you can ctrl+f for the text necessarily… you’d have to go through every image manually and inspect every single line, and even then there are no guarantees (perhaps they encoded that information like morse code in bumps in some lines that are only barely visible at 1000% magnification)