or Connect
New Posts  All Forums:

Posts by EricTheHalfBee

 Secretary of Commerce: Yes, it's designed to bolster individual confidence in a previous domestic automobile purchase. Dave: So we're spending 47 million dollars to make people feel better about a car they've already bought? From the movie Dave.
I guess Samsung would have to tread carefully here. By showing a rumor article from a magazine they're covering their asses by giving away inside information they might already know (because they're a supplier of LCD screens).
 Funny how in previous discussions about the problems with malware on Android you demanded "proof" of something happening.
 If the doctor makes claims that people could use what he's talking about and cure cancer simply by doing a little extra work, then I'd have a problem with it. Or if he's claiming that others are already curing cancer using techniques he's talking about. That's what he's saying - that the systems are in place, forensics experts are ALREADY exploiting them to get at data, and others could too "if they really tried".
Why doesn't this guy do the OBVIOUS? Connect his iPhone to a hone WiFi network where the iPhone is the only device connected. Then record all of the traffic (packets) that leave the iPhone. Would be pretty easy to do and then you'd know EXACTLYwhat information is being "dished out" from your device. Why hasn't he done this one very simple task?
 No kidding. Imagine that - the architects/developers of an operating system have ways to gain access to portions of it that normal people never would.
 Poor little baby. What are you, 12? How clever changing my from Bee to Wit. How many hours did it take you to come up with that nugget of genius? I suppose you have a long list of words you can add an "i" in front of in order to make yourself appear witty as well. I stand by my comments. It's one thing for someone to claim the government is spying without having concrete proof. It's quite another for someone to claim (and list ) modules in an OS that supposedly do this,...
I want to see this guy demonstrate this function.   I'm so sick of people talking about what "could be happening" or that it's "possible". Quit talking out of your ass to make a name for yourself and show us a working, functioning exploit where you've successfully pulled data off a device. Like he claims forensics agencies are doing.   Otherwise STFU.
How did Apple manage to con those poor starving artists to work for free? /s
A LEGO version would be cool.Edited: Should have read all of the above first.
New Posts  All Forums: