Not exactly, most of the characters seem to call the company E Corp but the main character (who’s also the narrator) “corrects it” in his head.
Not exactly, most of the characters seem to call the company E Corp but the main character (who’s also the narrator) “corrects it” in his head.
But think about it though, it could be a way for X users that are prone to identity theft to be easily recognizable, like for instance if you’re notable enough they could verify your ID and then give something to your profile so people know it’s the real you! I’m thinking maybe a Blue X ?
You all can’t see Musk’s genius, that’s all.
That’s a very old post but yeah, it is, so is Ghidra (a retro-engineering tool). A lot of people have had the exact same argument of “the NSA made it, it has to be evil!” but lots of security people dissected the code (the fact that it was made by the NSA probably made more people look through it in fact) and no backdoor has ever been found in years. It’s safe to use.
Anything kernel level can theoretically modify anything in your TPM too, so Linux programs that use it (admittedly I’m not sure any user program use it) could be manipulated in weird ways