• 0 Posts
  • 128 Comments
Joined 7 months ago
cake
Cake day: December 13th, 2024

help-circle













  • Part of this is because the device has to connect to cellphone towers where the radio equipment is on its own lifecycle path and eventually replaced.

    Eventually the feature set of a device is too outdated for the carrier’s network to syooort it.

    Developer time is limited and so there is little to no value using that time to support very old hardware that would be WiFi only.






  • The relationship is the problem.

    Calculating the levenshtein distance is the first thing that comes to mind, then creating a regular expression that covers any leaked passwords tied to the same account.

    This is all easily scriptable and two leaked passwords might be all a script needs to discover the pattern. Once the pattern is known, all of their passwords become knowable.