> It seems like the author burned out not because of the work but because wherever he ended up
Don't get me wrong and maybe I was not clear enough (my bad). The infosec part I mostly contributed to was within some consulting companies where I was hopping from one assignment to another one, having different clients every week.
I saw some clients with some really strong security posture, I mean it. The "burn out" I experienced was clearly not related to that but pretty much from hacking, writing report, sleep & repeat.
"To quit" is an irregular verb in English, the past tense is just quit instead of quitted. So "I quit" can be either present or past tense, but from context it would be clear that "I quit infosec" is past tense.
Main difference is the strong focus on your preferences, diets, and goals. We use a combination of our own produced recipes, as well as recipes from food creators we work with. This allows us to tap into a wide range of different meals from the start and tailor the weekly recommendations to each individual.
On top of the personalization, we also have a different order process in which we take care of finding the best substitutes in case something is out of stock, and then provide you with personalized cooking instructions after the order.
Feel free to give it a try and let me know how it works for you.
Just sends GET requests to bunch of URLs in order to steal your bitcoins.
This attack has been explained and analyzed couple of weeks ago already.
Back at the time, it was about 84 BTC that they tried to launder.
I'm skeptical as well. Seems to me that so many things on your phone are talking to Apple (and other 3rd parties) anyways, that this might not even matter?
Although the FBI seems to be not very happy about this (if it's not just "for show" that is)[1]. The FBI is using the age-old "Save/Protect the children" argument, literally.
In particular Apple provide photo backups and (speculation) may be doing something server side to allow continuity features around text messaging from other devices.
This is getting into speculation about their role in Prism but I'm wondering how the iCloud encryption actually works. They say everything is encrypted while stored [0] but it's not clear (or I haven't found) whether that's using a key derived from the password or something Apple control. Either way I'm not entirely sure there's any way to stop Apple getting it if they're told to given the lack of transparency.
Never mind that none of this matters if you have unlocked the phone and it's on (default protection policy is protect until first unlock, which happens right after turnup). That's gotta be 99.9% of cases. Once the police or apple have a locked phone, all bets are off. Apple can just install an app remotely that gets them past the lockscreen, and unless this is from a cold boot, you have access to all apps and all data. This includes access to e.g. The logs of any configured skype session, the company mails ...
Add to that the usual closed software problems. Apple says they don't have a specific backdoor anymore (!), and they won't let you audit anything.
> It seems like the author burned out not because of the work but because wherever he ended up
Don't get me wrong and maybe I was not clear enough (my bad). The infosec part I mostly contributed to was within some consulting companies where I was hopping from one assignment to another one, having different clients every week. I saw some clients with some really strong security posture, I mean it. The "burn out" I experienced was clearly not related to that but pretty much from hacking, writing report, sleep & repeat.