kieron115

joined 2 years ago

If this had been an actual shitpost, you would have been instructed where to stick your antenna (up yer bumhole) to recieve more dank memes.

[–] kieron115@startrek.website 2 points 1 day ago* (last edited 1 day ago)

Thanks for adding in some more clarity. I worked as a cyber security analyst for the DoD for quite a while (IAT II level stuff) so I know it can get a little esoteric if you aren't in that world. But absolutely, they may have found an index/pointers but the data itself was already overwritten. Or hell they could have found a thumbnail image stored in a cache somewhere that was clear enough. I was just trying to help people understand how something could be both "destroyed" and recovered at the same time. Language can depend on perspective sometimes, and none of us can really know the answer just based on verbage in a report. Could be the person talking to the press didn't have a clear understanding. Either way it will be interesting to see what, if anything, comes of it.

Side note: since you brought up shredding, I thought I'd share the ridiculous process I had to go through when I was active duty. We had to use a crosscut shredder, dump it into a bucket of water to turn it into a slurry, let the slurry dry and then burn the remains lmao.

[–] kieron115@startrek.website 1 points 2 days ago* (last edited 2 days ago) (2 children)

Maybe I should have left that out, that's just me analyzing it too much. But lets say you shred a document. You would probably say that you've destroyed that document. If someone then took the pieces from the trash and painstakingly put them back together into a readable document, did you still destroy it? Or did you attempt to destroy it?

[–] kieron115@startrek.website 5 points 2 days ago (5 children)

My guess would be that it was a note on some form of digital media. Say you make a document on your computer that you later delete. The data doesn't actually get deleted, your computer just removes the location from it's giant table of contents and marks the space "available to write". Typically that information can still be retrieved using software tools until it is actually overwritten, and even then there are exceptions. So yes, it is entirely plausible for them to have forensic evidence of a note that someone attempted to destroy.

[–] kieron115@startrek.website 1 points 3 days ago

My banking apps, I don't feel comfortable spending money when I can't see my accounts in real time. Had a bad experience with BoA when I was younger.

[–] kieron115@startrek.website 2 points 3 days ago* (last edited 3 days ago)

That’s… not how it works. A law firm rep (usually) just has to connect to the swarm and see what IPs are there. It matters not if you share, being in the swarm is enough for them to send your ISP a notice of infringement. So as others said, use protection.

[–] kieron115@startrek.website 2 points 4 days ago (1 children)

Who counts the bean counters?

[–] kieron115@startrek.website 44 points 4 days ago (4 children)

Lies, I count way more than 15 beans!

[–] kieron115@startrek.website 3 points 6 days ago

It can't be any less scenic than the Four Seasons!

[–] kieron115@startrek.website 18 points 6 days ago* (last edited 3 days ago) (2 children)

LOL I thought OP was just calling their location a dump bc they’re having a charlie memorial. Nope, turns out it’s literally at the landfill. Now I can’t tell if this is a joke or not.

[–] kieron115@startrek.website 1 points 6 days ago

That term isn’t really used anymore due to the stigma attached to it. Anti-social personality disorder is the term. It’s also clinically different from NPD.

view more: next ›