I think we're at the point in cyber security that A. Unless you are rolling your own code it's safe to assume everything is compromised B. With what Cellbrite could do 3 years ago if a nation state is targeting you more than likely it would be very very difficult to positively identify. But what do I know 😉
Few suggest all names and numbers to many...coding implies putting suggested names and numbers together, while ignoring where they came from.
Nature sets perceivable (whole) and perception (partial) apart from one another aka a DE-CODEING.
it's safe to assume everything is compromised
If one consents to a suggested code; then one ignores that everything perceivable implies a decoding. Ones ignorance is the crucial part of encoding (suggested information) the decoding (perceivable inspiration).
I think we're at the point in cyber security that A. Unless you are rolling your own code it's safe to assume everything is compromised B. With what Cellbrite could do 3 years ago if a nation state is targeting you more than likely it would be very very difficult to positively identify. But what do I know 😉
Few suggest all names and numbers to many...coding implies putting suggested names and numbers together, while ignoring where they came from.
Nature sets perceivable (whole) and perception (partial) apart from one another aka a DE-CODEING.
If one consents to a suggested code; then one ignores that everything perceivable implies a decoding. Ones ignorance is the crucial part of encoding (suggested information) the decoding (perceivable inspiration).