I think for the TVs internal wifi, it's better to create a honeypot Wi-Fi exclusively for it, or a VLAN. It will constantly try to send data and fail. If we don't let it connect to anything, the TV might start sniffing for other open networks.
but the smart fridge in your upstairs neighbor’s kitchen could still be helping with smuggling your data out
I can understand that if you have a Samsung TV and a Samsung fridge, they can talk with each other. But will it work if you have a fridge from a different OEM? (I'm assuming the OEMs haven't formed a cartel for illegal data smuggling)
It's a good thing that no serious company uses excel spreadsheets to manage their data, right? Right?
Sorry but Linux is becoming too mainstream for me now. Time to hop on to BSD
Fun fact: if the girl punched with the same velocity as a mantis shrimp, her arm would have come out of her shoulder socket joint.
I've posted the link to the Github project so people can avoid it
Please go through the FAQ section of the git project. It's an eye-opener.
Q. Does this enable mass data breaches of website?
A. Yes. The next time you see a major data breach where customer data is clearly visible in the breach, you’re going to presume company who processes the data are at fault, right? But if people have used a Windows device with Recall to access the service/app/whatever, hackers can see everything and assemble data dumps without the company who runs the service even being aware. The data is already consistently structured in the Recall database for attackers. So prepare for AI powered super breaches. Currently credential marketplaces exist where you can buy stolen passwords — soon, you will be able to buy stolen customer data from insurance companies etc as the entire code to do this has been preinstalled and enabled on Windows by Microsoft.
Modification of history is one of the most common tools of dictators
The site should now be just called "Formerly Twitter"
reproducable jpegs? Excuse me?
I live walking distance from my local police department. If another person uses my NFT without my consent I will report them immediately. This is MY PROPERTY. The transaction has be verified scientifically on the block chain. Anyone who violates my NFT rights will pay the price.
Buddy, you have no idea who you are messing with. I have made a ridiculous amount of money in crypto/NFTs and I have the best lawyers. If you don’t delete those stolen jpegs, you’re going to regret it. When you steal someone’s property you get punished. Watch out.
Good point. We can have a honeypot wifi. Check my other comment in the thread.