Discussion in 'The Guru's Pub' started by Phragmeister, Mar 7, 2017.
Yes, that must be it. Well done, you solved it.
apart from a couple of blockheaded comments and the memes, everytime i tell this to people, and that the books and later on, the movies were all really spot on, about how an entity with resources and the skill to have complete control will definitely use that power for their own gains and power struggle, regardless of the flow of technology, the perspective of the collective knowledge and the direction the unweary public of the whole human population is headed to, all i ever get is, what have u done to hide it from these companies. I think the question should have been "WHY" instead of that "WHAT"
it does give a somewhat weird analogies, albeit extracted from innumerable sources, has that entity gained so much prowess that it may be able to mutate videos, audio transripts, texts, (we all know that can be done) as they see fit to their whole agenda.
Makes you go , hmmmph.... well if i go down that rabbit hole, i might not find the way back here.
agenda?....whose side you on?.......Agenda...
that is pretty much insane I just read the leaked tools are now already in use by the hackers. The situation is becoming more problematic.
download a copy of the latest kali linux and learn the stuff, prob's best form of defence if you need it or just for fun learning playing around hacking ya own network or what ever ...
better than running the same old benchmarks over and over again and again lol