And the king is not real! : Hysterics ::
I am one of that breed who gives guidance, direction, advice, questions, and practice - a secondary matter)- And your smartphone is apparently no - never scropy has not laid out, and I don't want to poke in clave or can't ..
OKOUSER @ 19.12.17, 16:25
P.S. You do not be offended, but once the topic is about anonymity and, respectively, denyonimization, then you can joke, if there is a reason.
.. although we need to think again, perhaps everything is completely different .. And then I, as I do not tell who, and the screensors, and the contents, and confess, and about sins .. on a silent .. It is necessary to revise the views and take from the older example
I looked at this booming desire to stuff through so much robber my "encryptions" into some clouds and not understand this philosophy, do not understand .. How did Zhvanetsky quoted it , without finite practical application? .. And do not forget that Delet is not at all - when you will appear to the Most High, all these files will be extracted and presented!
Eh, they took me what hackers by the generator of ideas - I would suggest it so much - it would be swam! .. In the meantime, the refrigerator is flushed, earned, but empty .. But once they do not take - it means that they themselves already know and work, plunge!
Hackers can secure a comfortable existence, only selling other people's passwords.I thought to smell on everything and encrypt the whole phone, but I read that the productivity drops and changed my mind.But there is a way out: Apple! And everything is "encrypted", and over the performance here again "worked":
http://m.interfax.ru/592790. )
Russians will judge for the illegal acquisition of GPS trackerThe tracker is equipped with a portable radio microphone with information transmission function through cellular channels, which allows you to classify it as a special technical tool for sewaging information.
Well, what then do not judge for the smartphone? oxymoron!
So it's fine on your own logic: no devices - no threats IBMy logic is different: there are max autonomous, independent and in contact with mines with an external world, a device - the threat of IB are reduced to min! OK, my interests do not coincide with the majority, I am supervised on this holiday, stopping propaganda! .. Posts a stream ..
Post has been editedxynta123 - 21.12.17, 14:53