The counter to this is when you’re doing something a really dumb way because of requirements and restrictions and someone’s just like “that’s so dumb, ignore your requirements and do this other thing instead”
prettybunnys
don’t even get me started on how ham and pineapple pair
Cognitive behavior therapy would kill to have the ability to jack people in.
That’s like the end goal of it lmao
Unfortunately this is much less true than we’d like to pretend.
They might get to be frustrated in meetings but the ecosystem is still ruled by the same fucks that run the other ones.
Yep.
The acid from the pineapple and tomato sauce almost pair for the same acid hit and their sweet flavors complement each other.
We like pineapple with doughy things
We like tomato with doughy things
Pineapple and tomato are a shockingly good combo
And cheese makes juuuuust about anything better.
This who say pineapple on pizza ought not exist probably think Italians “invented the tomato” too.
The warning was meant for you.
Yes. Maybe. Sometimes. Much more likely if you do an encrypted backup and decrypt it with the tool.
Regardless it’s not guaranteed to pick them up.
It can help you if you think you are BUT especially with iPhones it can only scan your backup, unless you jailbreak the phone and can do a full disk dump.
As a mobile security expert this is just one of the tools in the kit, but it ought not be used by a “end user” as a verification tool. This does NOT verify you aren’t being tracked, it can only verify that signatures of the malware exist.
You can use pip to install the tool.
it’s call mvt
Your package manager might have it.
If you’re on a Mac just use brew to install it.
Don’t use this third party app.
So I looked up the IDF bulldozer and no, these things are actually fairly armored.
Wild stuff actually
She better chill fr 🥵