An open pit at an elevation of 1.5km still means the bottom of the pit could be 1km higher than the place the ore is processed at
An open pit at an elevation of 1.5km still means the bottom of the pit could be 1km higher than the place the ore is processed at
Depends on the scale of “going down”. Many mines are in the mountains and the material has to be brought down to lower elevations. The mine entry may be lower than the nearest pass but still a lot higher than the destination of the ore.
And the brain didn’t even know it was naming itself.
The ancient Egyptians removed the brain before mummification because they considerd it to be basically useless. Later associations between motor control of muscles and the brain were discovered but it wasn’t until the development of modern neuroscience that the brain was considered to be the seat of awareness, self and intelligence.
Client isolation doesn’t help. That is just the access point not routing traffic between connected devices. The problem with WiFi is it is a radio signal. Everybody in range can receive 100% of all communication on that network. Just by being in range the attacker can do passive sniffing. No wiretap needed like with cabled networks.
WiFi is encryoed if it uses a password. So any public WiFi without a password can be sniffed by literally every device in range (no need to connect to the WiFi for sniffing). On public WiFi with a password, the radio signal is encrypted but everybody knows the encryption key. So everybody connected to the WiFi can still sniff the traffic of everybody else.
That encryption is only on the WiFi level, so encrypted radio signals, not on the actually traffic level (like TLS/HTTPS etc).
No, why would it? It will run code in the context of the current user which is absolutely enough to start a new process that will run in the background, download more code from a attacker server and allow remote access. The attacker will only have as much permissions as the user executing the code but that is enough to steal their files, run a keyloggers, steal their sessions for other websites etc.
They can try to escalate to the admin user, but when targeting private victims, all the data that is worth stealing is available to the user and does not require admin privs.
Are you actually arguing exploitation is necessary? That any system treating all people fairly will result in everybody starving?
Feel free to let others exploit you, I will keep trying for the fair system
They might not know there are alternatives. So they likely do not ccomplain to their IT person.
Dont be a “jUsT uSe LiNuX” guy, but when you see them frustrated maybe say “hey I see you are frustrated as well and I as a patient are concerned about my medical data privacy. You know there are better and safer alternatives, maybe you could ask your IT if it would be possible to switch to Linux?”
Realistically, they can’t switch because the software to use some $€1m medical device only runs on windows.