
What is the context for the sensitive information being sold?

What is the context for the sensitive information being sold?

because you don’t know what the last person using that IP did
See also: why you don’t wear a condom someone else came in

MAC address is in the data link layer of the networking stack, and would only be seen by other devices on the same network as you. This isn’t visible to websites you visit (unless you’re on the same subnet), and as TCP packets go through network hops, the MAC address is replaced with with the routers MAC address for each hop.
The reason for MAC address randomization (standard on iPhone and Android) is not for anonymity to the websites you visit, but is there to anonymize the wifi broadcasts in your general vicinity, like a 30 meter radius. The MAC address is randomized so that broadcasts to check wifi networks while you’re out and about can’t be used to track your physical location.

It just takes one time logging in without having VPN enabled for your account to be associated with a location. Their ad network probably filters out known VPN IPs, or IPs from countries where there are no ads to serve up, which might leave the only valid IP address associated with their account to be used.


It’s really a no win situation though if the boy complies. Newsmax will show footage of a game he plays in as evidence that boys are playing in girls sports, and the idiots who watch will believe it and support even worse politicians and laws.


I’d like to believe, but the source for the article is a random Medium article which claims there were leaked document, but the headline is clearly click bait. The medium post doesn’t go into any details about this, it just outlines some open source tools with “ai” to do basic tasks to run your infrastructure in AWS, not what any engineer working for AWS would actually be doing.
I think with your example of “call mom” there’s some relationship thing in contacts you have to setup, even if the name of the contract is mom. I’m not sure how you tried with calling other people, but I’d suggest changing the contact name for your mom to a very specific name, and then try using that name and saying something like “Call Mary Elizabeth Jones” and see if that works.
Also I’d try initiating voice input different ways. Your car button might just trigger the input and send it to Google Maps. what if you hit the microphone button in Google maps on the screen and then said the command. What if you said “Hello Google”?
Personally I’ve always found voice input hit or miss, and Google has been constantly changing things it’s hard to even keep things straight on what you’re supposed to do. I would say your best bet is to try every conceivable option till you find what works, and then use that for as long as you can until Google breaks it.


Yeah I don’t think this is the best analogy, but the point being is brand loyalty can only go so far. Like if you’re going to run out of gas in the next 20 miles and there isn’t an Exxon station within 100 miles, do you just pass all other gas stations and have your employees break down on the side of the road?
I just can’t imagine any actual competitors to AWS would impose such restrictions on their employees that put them in a worse position to do their jobs, so it’s a bit silly that it’s coming from Walmart, when they don’t compete in that space.


Totally, I understand that, but seemed to be an extreme measure they are inflicting on their employees that doesn’t really change anything. It’d be like if ExxonMobil didn’t allow their employees with company cars to fill up at a Chevron station.


There’s so much vendor lock in with AWS, migrating to another provider over an outage even lasting 24h would be a tough sell. This isn’t unique to AWS either, each of the cloud vendors have their own lock in and their own problems. If you had the money you could run in multiple clouds, but for most businesses who were only running in a single region, I can’t imagine they’d choose this option.


Can confirm, about 10 years ago, the company I worked for migrated to AWS, and I managed the transition. We planned everything meticulously so that there would be no downtime, and used it as excuse to fix a lot of tech debt. No one was supposed to even notice the cutover, and when we did it, I expected the only feedback to be that things seemed faster and were working as expected. A few hours later, we get a complaint from an Account Manager for Walmart that they can’t access the platform at all. There was a lot of confusion and back and forth, turns out their IT department had an allow list or something in the corporate DNS to not resolve to AWS owned IPs unless approved. We eventually got them to add our domain to their allowlist, but it seemed insane that they would spend the effort to implement and maintain that level of control.


stream torrents
It’s called leeching
And also a loophole for unmarried religious women.

If messages aren’t end to end encrypted, then their contents of the messages can be intercepted by Telegram or any adversary who has access to Telegram’s systems. This is what the US Government was doing with Prism to suck in unencrypted data from ISPs without their knowledge. By not having end to end encryption, you have to trust that Telegram administrators are being truthful when they say they’re not looking at your messages, and that their systems are never compromised by crimegroups or nation states without Telegram’s knowledge.

If it’s a private group they don’t know what’s happening
This is not true, group chats with more than two members on Telegram are NEVER encrypted. Telegram admins have full access to see the contents of these private chats, and have the ability to respond to court orders, but they were ignoring those requests. This is why he was arrested. Google/YouTube respond to court orders and do take stuff down, and actual encrypted messengers like Signal have no way to see the contents of the messages, which is why the owners and operators of these services have never been arrested.

I don’t see why the CEO of Telegram is concerned about laws about scanning of private messages since the vast majority of the communication on Telegram is unencrypted.


When I bought an HDMI capture card years ago, it came with a little card that said “Do not use HDMI splitters to bypass copy protection”


mission failed successfully


What’s the right way to do money math without floats?
Still not sure what you’re talking about. What was the sensitive information stored on servers that got sold?