Can you really trust airplane mode to ensure there is nothing going out. I agree people should just leave them at home, but these bags are like putting tape over your laptop camera. Just an extra peace of mind when going to the Dr.
Can you really trust airplane mode to ensure there is nothing going out. I agree people should just leave them at home, but these bags are like putting tape over your laptop camera. Just an extra peace of mind when going to the Dr.
Looks like everyone should be getting these bags
I remember replacing that cable on my 13 in Wallstreet PowerBook. The cable made a 180 degree turn causing it to break internally. Apple replaced it the first time, but I had to do it when it broke the second time.
I am running Kubuntu on mine
That’s interesting, never thought of that as an attack vector.
How would you set that pin on a SIM card in an iPhone?
So they took the SIM card out and got the phone number from that? I guess I didn’t realize you could do that.
I’m confused, in the article he said it was a brick to whoever has his stolen phone. How did they get his phone number to send him text messages? Did they crack the passcode and needed the iCloud password?
Don’t even try and format code with markdown, now you have to make a post with a title.
Oh my bad, I was inferring that from the original article. Those articles you posted are good and talk about the CAN attack, but the original article talks about the rolling codes using a flipper zero like device.
It’s near impossible to clone the signal from newer rolling codes, you need to trigger the key fob with out the signal reaching the car and then recorded with the flipper zero, then played back to the car. It takes a lot of coordination using the key fob. Here are some videos of it.
“Whatever you use to listen to music, you can probably link it up with ListenBrainz.”
I don’t think I can hook my turntable up to it.