Harder on the corporate side, but this has been an issue in the warehouses.
Encrypt them before they’re ever put there. One example I can think of is in resilio sync, which has the option for sharing a folder to an encrypted peer. Other peers encrypt it before sending anything, that peer doesn’t have the decryption keys at all.
Yeah, I want my passwords unencrypted in the browser, where they belong!
Remainder that Tails is an NSA PRISM targeting keyword. Congrats on making the list, folks!
They are logged, but swatting people get around it. They are suspicious “looking” calls, but so are bomb threats.
Swatting is pretty much always a blocked number to a non-emergency line. If they are traced it is typically one of those free online voip services. It takes work and access to really get from A to B, which is why it only happens when there are awful results.
In the US at least, 911 gets special access and calling it will always get you to your local dispatch (unless you have voip with the wrong account address). Non-emergency is just a normal phone number. If someone wants to call from out of the area or hide their number, non-emergency is how they have to do it. This is suspicious because in a real situation like “I just shot my dad” or whatever they say, nobody is taking time to look up non-emergency.
It has activation issues as the license is tied to hardware. If you have a retail license tied to your account it will prompt you to transfer from another machine, OEM does not. Nowadays people don’t even get a key, although it can be extracted from the firmware.
Most people are running Windows OEM licenses that don’t transfer to VMs. A retail license you can move around.
It’s probably something most people could learn a bit more about. On Red Hat or Fedora you don’t have to get too far out of vanilla before SELinux starts breaking things (oh, you wanted your custom systemd service to run that binary from that directory? Tough! Figure it out!), in comparison AppArmor on Ubuntu and Debian seems to get in the way a lot less. I’m not sure if that’s due to how it functions as a product or upfront work to configure it to be less intrusive.
Specific configuration is an implementation, as are hooks they may add to their own software to leverage features. Both Debian and Ubuntu also build their own profiles.
Thats why they said “Ubuntu’s AppArmor implementation”, as in how they configure and integrate it.
CEC. Typically works well. Sometimes buggy.
Throwing all the taking points into a bucket. I bet those prisoners are also learning critical race theory.