If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Display Modes |
#91
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model InExistence
On 3/2/2018 3:04 PM, ultred ragnusen wrote:
nospam wrote: Fraud is deliberate deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. The readers will note that nospam has been told many times that fraud contains /multiple/ elements, /all/ of which must be present for it to be considered fraud. altering an imei meets all of them. (1) A material representation was made; the altered imei. (2) the representation was false; the imei is not the original, therefore false. (3) the speaker knew it was false; it was knowingly altered. (4) the speaker intended the other party should act upon it; the other party being the cellular carrier. (5) the party acted in reliance on the representation; and they did, thinking you had a different phone than the one you actually had. (6) the party thereby suffered injury. providing service to which you are not entitled. fraud. Remind me to use you as a defense lawyer who will say anything to get his client off the hook, but at the same time, remind me not to suggest you as a prosecutor, as they have to follow the rules of law. So do good defense lawyers. Now can we please get back to photography. -- PeterN |
#92
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model InExistence
On 3/2/2018 6:04 PM, ultred ragnusen wrote:
Wolffan wrote: Fraud is deliberate deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. The readers will note that nospam has been told many times that fraud contains /multiple/ elements, /all/ of which must be present for it to be considered fraud. (1) A material representation was made; (2) the representation was false; (3) the speaker knew it was false; (4) the speaker intended the other party should act upon it; (5) the party acted in reliance on the representation; (6) the party thereby suffered injury. http://www.houston-opinions.com/law-fraud.html Simply changing your IMEI isn't and never was fraud, and, even in the UK, where it is an illegal act, it's only symbolic in that the law is almost completely never enforced in the dozen years it has been in existence (and it was never intended to be enforced because it was clearly stated to simply "send a message" by the originators themselves). In the US, it may very well be fraud, however, I will not go into the details, as to why, because that is off topic. As I said earlier, get back to photography. I suspect that the The vast majority here do not want to listen to you commenting on what kind of a person nospam, or anyone else is. That applies to nospam's responses claiming what kind of a person you, are. Nonetheless, nospam, because of the strange way his mind works, has no concept of privacy, where he thinks every action anyone takes is to cause someone harm and yet - when Apple causes harm - he defends Apple's actions with his very life. Odd chap that nospam seems to be. -- PeterN |
#93
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
In article ,
ultred ragnusen writes: Barry Margolin wrote: Yet another good reason to use a dumb flip phone. definitely not. those are *far* easier to crack. they aren't even encrypted. But you probably don't have much incriminating data on it in the first place. I agree with the sentiment to not /put/ incriminating data on a phone, where a dumb phone will naturally contain far less automatically generating data in the first place. But I bring up the sentiment that anyone who thinks /any/ phone is /safe/ is a fool, because, for a criminal anyway, the biggest incrimination is simply the ping to the cellular tower that makes a cell phone work as a cell phone. Those who /feel/ safer with brand X phones versus brand Y phones because the marketing of brand X is better than brand Y, I posit, are fools, because the weakest set of links of all cell phones are the same. The weakest part of any device is the wetware - the person operating it. |
#94
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model InExistence
On 06/03/2018 21:05, Richard L. Hamilton wrote:
In article , ultred ragnusen writes: Barry Margolin wrote: Yet another good reason to use a dumb flip phone. definitely not. those are *far* easier to crack. they aren't even encrypted. But you probably don't have much incriminating data on it in the first place. I agree with the sentiment to not /put/ incriminating data on a phone, where a dumb phone will naturally contain far less automatically generating data in the first place. But I bring up the sentiment that anyone who thinks /any/ phone is /safe/ is a fool, because, for a criminal anyway, the biggest incrimination is simply the ping to the cellular tower that makes a cell phone work as a cell phone. Those who /feel/ safer with brand X phones versus brand Y phones because the marketing of brand X is better than brand Y, I posit, are fools, because the weakest set of links of all cell phones are the same. The weakest part of any device is the wetware - the person operating it. True! Listen he https://www.youtube.com/watch?v=jhZv3QjmbdA Enjoy! :-) |
#95
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model InExistence
On 07/03/2018 11:45, David_B wrote:
On 06/03/2018 21:05, Richard L. Hamilton wrote: In article , Â*Â*Â*Â*ultred ragnusen writes: Barry Margolin wrote: Yet another good reason to use a dumb flip phone. definitely not. those are *far* easier to crack. they aren't even encrypted. But you probably don't have much incriminating data on it in the first place. I agree with the sentiment to not /put/ incriminating data on a phone, where a dumb phone will naturally contain far less automatically generating data in the first place. But I bring up the sentiment that anyone who thinks /any/ phone is /safe/ is a fool, because, for a criminal anyway, the biggest incrimination is simply the ping to the cellular tower that makes a cell phone work as a cell phone. Those who /feel/ safer with brand X phones versus brand Y phones because the marketing of brand X is better than brand Y, I posit, are fools, because the weakest set of links of all cell phones are the same. The weakest part of any device is the wetware - the person operating it. True! Listen heÂ*Â*Â*Â*Â* https://www.youtube.com/watch?v=jhZv3QjmbdA Enjoy!Â* :-) The woman in this video looks like she is completely at home outside in the winter snow. Three-time bronze medalist and Olympic alternate Elizabeth Putnam may have spent much of her life practicing and competing on the world’s best rinks, but she’s most comfortable skating on a frozen lake in the middle of the wilderness. The stark, stunning beauty of the mountains of British Columbia is the perfect backdrop for her exceptional skating talent. The ice of the frozen lake is not perfectly groomed, and the outdoor temperature is not carefully maintained, but Elizabeth skates as if she is competing for a gold medal — perhaps even better. Without the pressure of competition, she can embrace the grace and emotion that accompanies her skating. This particular frozen lake is at an elevation of 2,500 feet and can only be reached by helicopter. Pilot Bradley Friesen not only delivers her, but it is from his helicopter that this uniquely stunning video is captured. http://videostory.dkn.tv/life/woman-...oosebumps.html Enjoy! |
#96
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
Eric Stevens
Sat, 03 Mar 2018 03:36:14 GMT in rec.photo.digital, wrote: On Fri, 2 Mar 2018 21:44:36 -0000 (UTC), Diesel wrote: David_B Thu, 01 Mar 2018 07:40:06 GMT in rec.photo.digital, wrote: The point, I'm sure, is that *NO* 'phone is 'safe' from the eyes and ears of those who are tasked to monitor us. Not true. I think it is true. The first piece of information which can be gained from a phone is that it exists. The next is the when and where of its existence. Who it communicates with (or vice versa) is another piece of information. I don't dispute the information listed is available, but, that doesn't mean your phone and/or it's contents is an open book either. Yours might be, you don't seem to take serious interest in it, but don't assume everyones phone is friendly to strangers. As, they aren't all. Mine for example wouldn't provide you much useful data aside from logistics, and, I can mess with those stats too.. so... -- Don't become the next David Brooks cyberstalking victim! Visit https://tekrider.net/pages/david-brooks-stalker.php (10/10 WOT) to learn more. If you've already become a victim or know someone who has, you can provide the following information to them, your lawyer, local law enforcement, etc. https://www.devon-cornwall.police.uk - His local police. Report? David Brooks (BoaterDave) Jersey Cottage 86 Granary Lane Budleigh Salterton Devon EX9 6ER United Kingdom Phone: 44-1395-443340 (H) 07974-193550 (M) Email(s): , |
#97
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
ultred ragnusen
Fri, 02 Mar 2018 22:27:16 GMT in rec.photo.digital, wrote: Diesel wrote: *sigh*. Now I know you're bull****ting your actual knowledge on this subject. Provide valid peer review articles from crypto related circles indicating that all known ciphers have been broken, or, i'm going to have to dismiss you outright as some useless twit script kiddie cypher wannabe expert that you now appear to be. I already cited the historical context for the basis of that statement, where you really need to ask Rommel how he was able to read /evertyhing/ the American embassy in Cairo sent to Roosevelt about the British preparations in Lybia & Egypt. Rommel was a Desert Fox because he had in his hands what others thought was safely locked away. Also witness Donets' dismay when he finally found out that the Enigma machines were reproducing his naval communications faster than he could. Likewise with the Japanese when Roosevelt had part 14 of the declaration of war translated and in his hands before the Japanese diplomats were able to translate it for Hull. There are two ways around /every/ cipher. You've posted NOTHING which contradicts what I wrote. You clearly don't have any first hand knowledge of the world of cyphers. You erroneously assume all cyphers can be broken with current technologies, and, that's just not mathematically true. -- Don't become the next David Brooks cyberstalking victim! Visit https://tekrider.net/pages/david-brooks-stalker.php (10/10 WOT) to learn more. If you've already become a victim or know someone who has, you can provide the following information to them, your lawyer, local law enforcement, etc. https://www.devon-cornwall.police.uk - His local police. Report? David Brooks (BoaterDave) Jersey Cottage 86 Granary Lane Budleigh Salterton Devon EX9 6ER United Kingdom Phone: 44-1395-443340 (H) 07974-193550 (M) Email(s): , |
#98
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
David_B
Sat, 03 Mar 2018 17:20:01 GMT in rec.photo.digital, wrote: On 02/03/2018 21:44, Diesel wrote: David_B Wed, 28 Feb 2018 08:50:53 GMT in rec.photo.digital, wrote: FYI ...... (I didn't know either! ;-) ) If you spent less time stalking people, you'd have time to keep uptodate on more important matters. Such as your iphone being 0wned by a 3rd party if some people with very deep pockets believe you have something of value on it. Don't sweat the 'small stuff'! ;-) I don't. However, your need to stalk and dox people isn't what I consider to be small stuff. Intentionally copyright infringing others property isn't small stuff, either. And, attempting to file false police reports against another person isn't exactly small stuff, either. You're guilty of doing ALL of the above on more than one occasion. Going so far as to try and solicit help for stalking on this very newsgroup! MID: http://al.howardknight.net/msgid.cgi?ID=149456200100 -- Don't become the next David Brooks cyberstalking victim! Visit https://tekrider.net/pages/david-brooks-stalker.php (10/10 WOT) to learn more. If you've already become a victim or know someone who has, you can provide the following information to them, your lawyer, local law enforcement, etc. https://www.devon-cornwall.police.uk - His local police. Report? David Brooks (BoaterDave) Jersey Cottage 86 Granary Lane Budleigh Salterton Devon EX9 6ER United Kingdom Phone: 44-1395-443340 (H) 07974-193550 (M) Email(s): , |
#99
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
ultred ragnusen news:1gacqhqsi3bfv
Sat, 03 Mar 2018 19:23:37 GMT in rec.photo.digital, wrote: Diesel wrote: I'm hoping for an interesting and educational discussion since you brought up the subject of cracking. I do hope I'll find that you actually know WTF you're writing about, and not just tossing words out there that you think gives others the impression you have knowledge of the subject. Did you even /look/ at the links I already provided on that subject? I'm very familiar with the history of crypto. It's been a passion of mine since I was of single digit age. You are essentially writing from your arse concerning the subject. You've seen one too many movies. Not all Cyphers have backdoors and some are so resistant to brute forcing, it would take far more than your lifetime to succeed. Some cyphers are setup in such a way that if you don't have the decryption key, you are not going to be reviewing the encrypted material in your lifetime. It's math. -- Don't become the next David Brooks cyberstalking victim! Visit https://tekrider.net/pages/david-brooks-stalker.php (10/10 WOT) to learn more. If you've already become a victim or know someone who has, you can provide the following information to them, your lawyer, local law enforcement, etc. https://www.devon-cornwall.police.uk - His local police. Report? David Brooks (BoaterDave) Jersey Cottage 86 Granary Lane Budleigh Salterton Devon EX9 6ER United Kingdom Phone: 44-1395-443340 (H) 07974-193550 (M) Email(s): , |
#100
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
On Fri, 23 Mar 2018 17:07:52 -0000 (UTC), Diesel
wrote: Eric Stevens Sat, 03 Mar 2018 03:36:14 GMT in rec.photo.digital, wrote: On Fri, 2 Mar 2018 21:44:36 -0000 (UTC), Diesel wrote: David_B Thu, 01 Mar 2018 07:40:06 GMT in rec.photo.digital, wrote: The point, I'm sure, is that *NO* 'phone is 'safe' from the eyes and ears of those who are tasked to monitor us. Not true. I think it is true. The first piece of information which can be gained from a phone is that it exists. The next is the when and where of its existence. Who it communicates with (or vice versa) is another piece of information. I don't dispute the information listed is available, but, that doesn't mean your phone and/or it's contents is an open book either. Yours might be, you don't seem to take serious interest in it, but don't assume everyones phone is friendly to strangers. As, they aren't all. Mine for example wouldn't provide you much useful data aside from logistics, and, I can mess with those stats too.. so... My point is that deciphering what is in the phone is only one part of the information which gan be gathered from the phone. A great deal of useful information can be garnered without cracking the code. The more messages that are intercepted the more deductions can be made. -- Regards, Eric Stevens |
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
iPhone addicts cut-back on their children's food to afford latest iPhone | nospam | Digital Photography | 9 | August 31st 16 05:12 AM |
iphone crybaby sues Nikon (boo hoo! No iPhone support for D500 wifi!! | Mark Storkamp[_2_] | Digital Photography | 15 | June 25th 16 05:20 PM |
my application for iPhone: Model Pose | George Kerby | Digital Photography | 0 | November 12th 08 04:05 PM |
my application for iPhone: Model Pose | Folley Angstrom | Digital Photography | 0 | November 12th 08 07:53 AM |
The Existence of God | Happy Man | Digital Photography | 9 | March 1st 07 06:32 AM |