- They can literally keep a dead guy on the ballot. Then the vice president would take over immediately upon inauguration.
- The Democratic Party could quickly pick a different candidate and have that person run and beyond the ballot.
Who is it? Just rando or some reference?
ELI5 pls
So basically the perfect question for the internet?
c a r c i n i z a t i o n
^^ This guy got chased out of the temple by a furious Jesus Christ /s
It becomes gambling when you are going on gut feelings without researching what you're doing.
If you have an investment strategy that financial advisors approve of, let's say investing 70% in a US index fund, 20% bonds and 10% high risk mutual funds that you don't touch for years or decades, that's investing.
If you're just randomly picking stocks, buying and selling in order to make a quick buck because of some guy screaming at you on television without any real research into a company other than a few google searches, that's gambling.
I want to remind everyone that there is no guarantee that the market / index funds continue to go up. It hasn't happened in the US market, but look at the Nikkei over the last 30 years - if you had invested in the 90s you would only now be getting some of your money back - that is a long time.
(this message intended for jim bowie only)
"This is how I spent the previous month, creating these 3D printed objects to achieve a goal", not "I am about to pass away and I spent my final month 3D printing these forgettable objects"
And go off to die in wars.
THIS IS THE HILL I DIE ON.
No one has ever recovered overwritten data, as far as anyone can tell. Go look it up. The technique was only a theoretical attack on ancient MFM/RLL hard drive encoding (Gutmann's paper). Even 20 year old drives' (post 2001, approx) magnetic encoding are so small there isn't an 'edge' to read on the bits. A single pass of random data is sufficient to permanently destroy data, even against nation-state level actors. Certainly enough for personal data.
from https://en.wikipedia.org/wiki/Gutmann_method :
Most of the patterns in the Gutmann method were designed for older MFM/RLL encoded disks. Gutmann himself has noted that more modern drives no longer use these older encoding techniques, making parts of the method irrelevant. He said "In the time since this paper was published, some people have treated the 35-pass overwrite technique described in it more as a kind of voodoo incantation to banish evil spirits than the result of a technical analysis of drive encoding techniques"
More reading material:
- https://commons.erau.edu/cgi/viewcontent.cgi?article=1131&context=jdfsl
- https://security.stackexchange.com/questions/26132/is-data-remanence-a-myth
- I can't find the page on wayback machine, but there was actually a contest someone ran to see if one, small, simple file on a new, unused drive could be recovered: https://www.root777.com/security/the-great-zero-challenge/
NOW THAT BEING SAID there is no harm in doing a secure, 35-pass overwrite other than the time, energy and disk wear. If watching all the bit-patterns of a DoD-level wipe using DBAN on a magnetic disk tickles your fancy, or you think this is a CIA misinformation campaign to get people to do something insecure so they can steal your secrets, please just go ahead and do a 35-pass overwrite with alternating bit patterns followed by random data. I can tell you that I believe in my heart-of-hearts, that one pass is sufficient.
And tomorrow is always just a day away.