I don’t need your location.
Pager transmissions contain a sender and a receiver. That’s all the information you need. If a known Hisbollah sender sends to a receiver, that receiver obviously has some ties to Hisbollah.
I don’t need your location.
Pager transmissions contain a sender and a receiver. That’s all the information you need. If a known Hisbollah sender sends to a receiver, that receiver obviously has some ties to Hisbollah.
By tracking who sent what to whom?
If you know the phone number of a Hisbollah member and they send messages to a set of pagers, these are likely Hisbollah pagers. If you do that to several phone numbers, you get a pretty comprehensive list of members. You don’t need to know, where exactly they are. That’s simply not relevant.
And again: if it’s a supply chain attack, you don’t even need these contacts. Just a single entry point into the supply chain of the organization.
So, what exactly do you think would be a proper reaction here?
Hisbollah is de facto a state actor in Lebanon. Lebanon is doing nothing against a group whose declared goal is the destruction of Israel, including shooting unguided rockets into civilian areas.
Now, how would you address that? Unless you have any idea how else to solve this, you’re simply talking out of your ass.
Maybe the guys shooting rockets at Israel?
Don’t play dumber than you are.
No, they are not.
As I wrote, you can track which pager got paged when. And you can identify who uses that pager. The pager itself does not need to transmit anything for that.
You obviously don’t know how tracking works.
…and you know which telephone numbers send data to the pager and at which time. That is sufficient to track or identify individuals.
If this is a supply chain attack, the attacker already knows, which pagers are part of the organization they want to target.
What this thread here shows really well, is that the general population vastly underestimates the abilities of intelligence agencies and technology in general.
Not that I think the Israel is the good guy in this conflict, but your argument is pretty weak.
Pager are designed to be trackable. If you have such deep access to these devices, you know exactly who got called by whom and when.
Yes, there will be collateral damage, but that’s almost a given in any armed conflict.
And a whole lot of content that I frankly would have preferred not to have seen.
When you’re 12 and your parents have no idea what you’re doing, you’ll end up in very dark corners.
And who does that?
I think you don’t really get my point. I’m not arguing that there are no ways to archive data. I’m arguing that there are no technologies available for average Joe.
It is hardly a good strategy to basically set up half a datacenter at home.
Thin concrete slabs are extremely brittle.
Is it? It’s rather expensive and would you really know, if the data is gone or corrupted?
You’d have to download every single file in certain intervals and check it. That’s not really low complexity.
But what actually is “archival”?
Like, what technology normal person has access to counts at least as enthusiast level archival?
Magnetic tape, optical media, flash, HDD all rot away, potentially within frighteningly short timeframes and often with subtle bitrot.
Most people are used to devices being at least somewhat safe. They don’t expect devices they buy from a large online retailer to be that bad. A flaw here and there, sure, but basically a 100% chance of death? Yeah, that’s not exactly to expect.
It’s usually not a question of legality, but efficiency.
It’s easy and efficient to bust someone for seeding, but busting hundreds for the odd file you can prove they downloaded is expensive and takes forever.
And just about 5 of them have the same capacity as an iPhone battery. Absolutely insane.
Had to work with a fixed string format years ago. Absolute hell.
Something like 200 variables, all encoded in fixed length strings concatenated together. The output was the same.
…and some genius before me used + instead of stringbuilders or anything dignified, so it ran about as good as lt. Dan.
And there are some truly magic tools.
XSDs are far from perfect, but waaay more powerful than json schema.
XSLT has its problems, but completely transforming a document to a completely different structure with just a bit of text is awesome. I had to rewrite a relatively simple XSLT in Java and it was something like 10 times more lines.
The long-term goal is for Rust to overtake C in the kernel (from what I understand
Your understanding wrong. Rust is limited to some very specific niches within the kernel and will likely not spread out anytime soon.
critical code gets left untouched (a lot of the time) because no one wants to be the one that breaks shit
The entire kernel is “critical”. The entire kernel runs - kind of by definition - in kernel space. Every bug there has the potential for privilege escalation or faults - theoretically even hardware damage. So following your advice, nobody should every touch the kernel at all.
Germany has a Sovereign Tech Fund for exactly this, and while it’s not perfect, it’s one of the better uses of my tax euros.
The leadership on both sides would not only lose power, but likely end up in prison or dead, if there’s ever peace.
They won’t do anything towards a peaceful solution.