1
Spurious Generalities / Re: My Final Days? (Doubtful)
« on: December 08, 2014, 01:15:39 pm »
The lack of paragraph breaks really is a dick move, but I did read it.
My diagnosis: leukemia.
Sorry.
My diagnosis: leukemia.
Sorry.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Also, the lead, Sarah Snook, is one of the most beautiful women I ever did saw.
there's gonna be material for daaaays
Spoiler
I don't even know anymore
What in the fuck hahah
Yep, because that is exactly what the Totse-community needs. Another split.
Is it a good idea? No.
Is it better than watching a broke-ass mormon autist grind the remaining userbase to dust? Yes
The petty bickering and never ending stream of shit posters/alts is what killed this community. And, make no mistake, this community is dead. I know for fact that I won't be alone in giving up on following yet another change of venue.
It's always the staff that catches the blame, but the truth of it is that this is just a shit group of junkies, degenerates, and pseudo intellectuals with very few exceptions. At the end of the day, this place and these people are simply more trouble than they're worth.
And you're one of them, kid.
Yep, because that is exactly what the Totse-community needs. Another split.
Is it a good idea? No.
Is it better than watching a broke-ass mormon autist grind the remaining userbase to dust? Yes
Meh, it's easier and more foolproof to just use a basic burner. It's really the only way to be sure that your sensitive data stays anonymous.
Anonymous wasn't the word I meant above, I meant secure. The whole point of having the whole OS including the IMEI on the SD card, was to be able to encrypt it and move it around(like onto an encrypted laptops HD). This way people could keep the entire phone encrypted. I believe on burner phones, the IMEI can be use to exactly identify the service/account information.
yeah, they're designed to though - phone handsets contain proprietary hardware and code (specifically GSM/CDMA etc. radios) so it's possible part of the boot process is hard-coded. I haven't looked too much into it in the past though, so I dunno for sure - will check it out a bit later
You can unlock the bootloader for Android. I'm sure you can do the same with Apple products, "jailbreaking" I believe is what they call it.
I'm well aware of that; I use Cyanogenmod on a few devices. What I'm talking about is the process the phone uses to load the boot device prior to getting to the bootloader.
I used to have a Nokia N9, which ran Meego. It was later hacked so that you could load android OS ROMs onto it; the best way to do so was to leave Meego installed, load Android onto an SD card, and install a multiboot patch over the standard bootloader in the phone's flash memory. You could effectively boot to an SD card, but the bootloader was still in the phone's flash, which then pointed to the SD card. This is the only way I'm aware of phone handsets being able to boot to external memory.
If you know of a way to skip loading from the bootstrap on the handset itself please share, because for security purposes, OP wants to try to set it up so that the phone memory is COMPLETELY untouched.