lol
That's really clever, you finally got me to dislodge this turd. Thank you!
Just saying that running automated tools and identifying those vulnerabilities is just the first step to learning hacking, but nothing more. To gain a proper understanding you must be able to find vulnerabilities manually or at least understand a certain exploit such as ETERNALBLUE which you won't really look for manually.
I'll be talking about digital signatures which is the basis for such things. I assume basic understanding of asymmetric cryptography and hashing.
Basically, you hash the content you want to verify with a secure hashing function and encrypt the value with your private key. You can now append this encrypted value to the content or just release it alongside it.
To now verify this content they can use your public key to decrypt your signature and get the original hash value, and compare it to their own. To get that, they just need to hash the content themselves with the same function.
So by signing their videos with the white house private key and publishing their public key somewhere, you can verify the video's authenticity like that.
For a proper understanding check out DSA :)
Removing those draconic entry requirements would be a start.
Lawful means "following a code", not "following the law".
EUROPA EST MAXIME MOMENTI
Not sure how much it fits online but I've never played a horror TTRPG and I'd love to try it! I like extreme stuff!
Okay and now let's get into threat modelling and risk management.
What is the purpose of a password manager? What are the possible threats against them, and what are those against singular passwords for services? What is the risk of each of those?
They keep trying to make money so they don't go under if/when Google pulls the plug on their easy money.
Copyright for individuals is to be respected. But corporations? Fuck them.
Fuuuuuuuuuuck Rockstar, sail the seas!