• 0 Posts
  • 52 Comments
Joined 10 months ago
cake
Cake day: August 30th, 2023

help-circle









  • Thanks for finding which paper it was… I have a copy but didn’t feel like finding it and finding the right paper. Call me lazy 🤷‍♂️

    And in the end, they codified what they saw as a natural, inborn, individual right. That wasn’t by accident - Jefferson was very intentional in the words he chose (and they argued over, properly). Knowing the language had to be clear and concise, this is what resulted. It’s pretty clear if you’ve read anything from 1600 onward.

    Some of how the writing of the time (and place, Britain) flows is, I suspect, partly an influence of French language that some also knew - “twenty and four years” is clear French construction, not English at all. Keeping in mind that before Shakespeare, the “English language” such as it was, was considered beneath “proper” Brits. Shakespeare marks the beginning of that change, so the French language influence carried on for a long time among the upper classes as a distinction.

    It’s pretty interesting to see this same kind of complex construction (from our perspective) in period writings, but also in many science papers today, where complex ideas are strung together in paragraph-long sentences in an attempt to capture the detail and nuance. Medical journals are particularly guilty of this.


  • From what I’ve read, that doesn’t really work - you’d need the encryption key, not the pin/password, because of how the encryption platform works.

    Again, it’s been a while, and this isn’t my field. I just remember being properly surprised at how little I understood - that the pin/password are merely keys to accessing the encryption key, and it’s all tied together in validating during hoot. Like you can’t image the system and drop it in another phone if it’s been encrypted, even if you have the pin - the encryption system on the different hardware would calculate things incorrectly (I did this once, dropped an encrypted image on a duplicate phone. That was fun trying to figure out why it wouldn’t work).

    There’s more to the puzzle that’s frankly above my pay grade, but last time I read about how to get into an encrypted phone, (even boot unlocked) required the expertise and tools of certain types of folks. Not your average “haxxor”.

    Granted, that expertise and those tools are getting closer to us every day…




  • Lol, I can appreciate your commitment. We all have our white whales, mine are rear fingerprint and cordless charging. Edit: Also prefer as much plastic as possible. Make it lighter and less likely to break. I have a ceramic phone, it’s pretty (when it’s out of the case) but it’s heavy. So breakage is more likely to happen. I also have a Moto E5. You can throw it across the room.

    I’ve had probably 5 times as many USB C port failures as I have micro ports… And I’ve had like 5 phones with micro (which needed charging all the time) and 2 with C. I do think C is better overall, but I don’t believe the durability claims. I already have a nice phone that really can’t be used for much since the C port died, and it’s part of the motherboard. Fortunately it has wireless, so I can use it for a spare device, just not a daily.


  • Whenever someone says it isn’t dead to them, it tells me they don’t realize most average consumers care about convenience most of all.

    They (the average consumer - that is about 98% of them) don’t understand the tech, so have no way of forming an opinion or realizing why they may want a jack.

    Or removeable batteries, etc. They’re easily swayed by shiny and seemingly “easy to use”.