Join Platy’S Readwise Highlights

A batch of the best highlights from what Platy's read, .

Many people have asked me "why don't you just try to login with the credentials in the breach" and obviously this would be an easy test. But it would also be an invasion of privacy and depending on how you look it, potentially a violation of laws such as the US Computer Fraud and Abuse Act (CFAA). In fact it would clearly constitute "having knowingly accessed a computer without authorization or exceeding authorized access" and whilst I can't see myself going to jail for doing this with a couple of accounts, it wouldn't stand me in good light if I ever needed to explain myself.

Here's How I Verify Data Breaches

troyhunt.com

Money is something that people living in specific contexts and circumstances use to buy and sell particular things, create particular relations of credit and debt, and participate in these relations in particular ways. __These transactions are enabled by but not reducible to money’s impersonality__, for the motivations and rationalities that shape them are determined by the transacting individuals’ personal perceptions and desires.

The Currency of Truth

Emily H. C. Chua

The Nintendo DS includes two very independent computers that will perform exclusive operations, each one having a dedicated bus. This design methodology is called Asymmetric multiprocessing and the resulting CPUs’ co-dependency will condition the overall performance of this console.

Consoles

EpubPress

...catch up on these, and many more highlights