Join Platy’S Readwise Highlights

A batch of the best highlights from what Platy's read, .

Many people have asked me "why don't you just try to login with the credentials in the breach" and obviously this would be an easy test. But it would also be an invasion of privacy and depending on how you look it, potentially a violation of laws such as the US Computer Fraud and Abuse Act (CFAA). In fact it would clearly constitute "having knowingly accessed a computer without authorization or exceeding authorized access" and whilst I can't see myself going to jail for doing this with a couple of accounts, it wouldn't stand me in good light if I ever needed to explain myself.

Here's How I Verify Data Breaches

troyhunt.com

In practice, a cryptex is a sealed Disk Image containing its own file system, which is mounted at a randomly chosen location within the root file system during the boot process. Prior to mounting the cryptex, macOS verifies it matches its seal, thus hasn’t been tampered with. Managing these cryptexes is the task of the cryptexd service with cryptexctl.

Cryptex: How a Custom iPhone Is Changing macOS Updates

eclecticlight.co

The machine hums and is muffled. It is sacred and profane. It is eradicable and unbearable. And it glows, against the dark.

What the Web Said Yesterday

newyorker.com

...catch up on these, and many more highlights