

You should read up on Celebrite. They most definitely can get into a wide variety of phones from a cold boot. GrapheneOS seems to be one of the only ones that make their job hard.


You should read up on Celebrite. They most definitely can get into a wide variety of phones from a cold boot. GrapheneOS seems to be one of the only ones that make their job hard.


100% agree, just listened to it recently and wow was it boring. That and Foundation, thought since liked the show that I’d like the books, wrong. Those are the only 2 books so far that I just couldn’t get into. But I suffered through to the end with both. Even started the second Foundation book and then asked myself why I was torturing myself.


Witcher 3, gave I multiple tries and just got overwhelmed every time I looked at the map.


deleted by creator
Hahahaha, bet he’ll claim it was rigged.
Oh, are these the scenes from war torn Portland I’ve heard about?
deleted by creator


If anti-trust is still a thing after the next 3 years.


You think this administration does any planning? They only have concepts of plans.


And if any of it is true, they’ll be the ones wondering why they didn’t get taken because they’re such good little christians.


The main settings that I mentioned are under integration services settings on the VM. There’s probably plenty of guides available on YouTube for Hyper-V along with the official Microsoft documentation (which probably isn’t that great).


Hyper-V is the hypervisor that the VM runs on. Yeah I don’t really know which malware scanners are the go to ones anymore. Just figure if I can get it to pass through 2 different ones ok then it’s probably ok. I’m sure there’s some other good ones out there. I’ve heard of ESET and virustotal, but I’m not familiar.


I use Hyper-V because I run server 2022 and it’s free. Hyper-V allows you to disable any host resource sharing in the VM settings.
On my sandbox VM I’ll scan the files then install and scan, then run the software and scan. I use both defender and I think malwarebytes. It’s a lot of extra work for no gain, but I’d rather be too careful than risk installing malware.


This is what I do. I have a VM for torrents and a VM sandbox to check stuff that I’m concerned about. At the host level I disable any type of sharing with the host, no copy paste, no sharing disks, nothing. The VM only gets the storage I assign to it and once I validate then I’ll detach and mount it to the host.
I caved for the pro. I just carry a cheap Kershaw right now. Would be nice to have something light with multiple tools.
https://stacker.news/items/616858
Here’s some charts from July last year. I don’t know if there’s any other leaked charts out there, but short answer is that your password doesn’t matter. Keep in mind that the images in the above link are a year and a half old, they can definitely crack updated OSs.