Anonymous ID: 6b15ce Jan. 28, 2019, 7:05 a.m. No.4938710   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>8723 >>8732 >>8752 >>8783

>>4938468

 

"The โ€œdepression generationโ€ were known for hard work and self-reliance. Their children โ€“ the boomers - were their spoiled children, who became the yuppies. They sought to live luxuriously, with a minimum of responsibility. The next generation โ€“ the millennials โ€“ have, so far, proven to be a generation that not only does not wish to take on responsibility, they are literally unable to do so."

 

This anon dismisses the lumping together of individuals into artificial & arbitrary groups called generations. Do I think millennials are a writeoff? Hell no, have seen too many outstanding minds. Some of them are here, and I doubt that they like being told that they are incapable of doing certain things. On the other hand, have also known boomers who started with nothing, worked like fiends their entire lives, and gave more than they took.

Anonymous ID: 6b15ce Jan. 28, 2019, 7:11 a.m. No.4938762   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>4938659

Don't dox yourself by revealing identifying personal info, anon. Now you have just filtered yourself down to 0.274% of the population and the deep state couldn't be happier.

Happy fucking birthday & many happy returns, fren. Be careful!

Anonymous ID: 6b15ce Jan. 28, 2019, 7:37 a.m. No.4938950   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9007

>>4938839

This post contains some truth and some error.

Microsoft and all manufacturers of proprietary software closely guard their source code. It is their "crown jewel" and they do not agree to allow others to study, reverse engineer, decompile, recompile, etc. the code. (I have heard they had private arrangements with some governments but this is not common knowledge.)

It is true that proprietary software can be full of exploits. It is likely that intel agencies are aware of many of the exploits before hackers exploit them, and before the software maker finds/fixes them. The parade of patches demonstrates statistically the quantity of vulnerabilities that exist.

It is true that Linux is a preferred operating system and that it is open source and anybody can inspect the kernel code and compile it for themselves. But that does NOT guarantee that it's free of vulnerabilities either. It is NOT TRUE that Linux cannot be hacked.

It is NOT TRUE that the financial industry gets to preview Microsoft's source code. Whether military and defense get to would be their secret and not disclosed to the public.

It is true that Windows is an ecosystem that is an attractive target of hackers because it's so widely used and some of the people who use it are clueless about computer security.

 

If one reads the Wikileaks Vault Seven drops, it is clear that EVERY device and EVERY operating system and even the hardware is compromised and can be exploited by intelligence agencies. Now that many of the vulnerabilities have been published, not just intel agencies but hackers too. Fixes have been made to some of the exploits, no doubt, but there is an endless parade of exploits. The more bloated the software, the more potential exploits will be found.

It is a proven axiom of software engineering that it is IMPOSSIBLE to wring 100% of the bugs out of a code base.

 

Personally the systems I use are Linux and I strongly prefer the open source software. But with the understanding that no software is perfect and all software contains exploits.