• 0 Posts
  • 70 Comments
Joined 2 years ago
cake
Cake day: June 12th, 2023

help-circle
  • I loved BB10. It had gesture-based navigation years ahead of its time, the Hub was the best notification system I’ve ever used, and it could run Android apps alongside BB10-native apps. It helped that I liked the form factor of the devices with physical keyboards, too.

    Nowadays can choose between a large, glass rectangle, and an extra-large, glass rectangle in one of two flavours: Apple and Android. It’s no coincidence that Android has become more restrictive in terms of control over your own device, as the competition has dwindled and thinned.







  • ramjambamalam@lemmy.catoProgrammer Humor@programming.devSee MongoDB
    link
    fedilink
    English
    arrow-up
    30
    ·
    edit-2
    2 months ago

    Atomicity: either all parts of the transaction complete, or all parts of the transaction don’t complete; there’s no “partly complete” state

    Consistency: the state of the database after a transaction is stable; all “downstream” effects (e.g. triggers) of the query are complete before the transaction is confirmed.

    Isolation: concurrent transactions behave the same as sequential transactions

    Durability: a power failure or crash won’t lose any transactions

    Traditionally, ACID is where relational databases shine.








  • I can think of easier ways of compromising the data besides brute forcing the keys, off the top of my head, and I’m just some schmuck. Relevant XKCD: https://xkcd.com/538/

    1. Compromise their endpoint with a malicious app on the app store.

    2. Gain physical access to the device and compromise it. Use your imagination – pickpocket, traffic stop or customs inspection by a compromised agent, seduce them with a honeypot, etc.

    3. Socially engineer them to mistakingly add you to their group chats.

    4. SIM swap

    Signal might be fine for journalists, criminals, cheating spouses, and general privacy when used properly with good OpSec but nation state adversaries have significantly greater resources than your average attacker, and thus require more significant security.