It’s a shame Apple decided not to implement e2ee like Google did.
This is an older article, but there is still no movement. https://forums.appleinsider.com/discussion/234352/apples-flavor-of-rcs-wont-support-googles-end-to-end-encryption-extension
You just described my playstyle :) The Frostburn gloves help with mana regen, 5+% lucky shot chance to return 20%+ mana, plus a ~20% chance to freeze on any hit. Using Avalanche instead of Shatter can help with free Ice Shard casts and there is an aspect for Avalanche to proc twice. You probably know all this though as its super meta. I’m worried of nerfs :(
Then you should know that attackers don’t take your plain-text or cracked password and the start manually guessing similar codes on your other accounts
Oh they absolutely do.
You keep going back to hashing methodology. I totally agree that if the website hashes your password correctly, its unlikely to be compromised.
That said, you are trusting the website in that regard, when it has been repeatedly proven that there are sites, even large ones, have exposed passwords.
You said at the beginning of this thread that you can’t trust password managers to manage your password correctly. But you trust random websites with that password instead.
So put your hashing discussion to one side, and think of the scenerio where your passwords are not encrypted. Because you can’t guarentee that they are.
What got me into this discussion was your comment
Changing even a single letter will completely scramble your password with hash, so for all intents and purpose it is equivalent to a unique password
It is just such bad advice. Anyone who thinks changing a few letters in their password used accross multiple sites deserves to be hacked.
Edit: I’m going to stop here. I don’t think I’m getting through. Thanks for the chat.
I totally understand. I think you’re missing my point.
I am willing to bet multiple sites we both signed up store their passwords in cleartext (or unsalted hashes, or broken hashing methods).
So the attackers now have one of our passwords. They may even have a number of our passwords. In my case, using a password manager, the attacker has multiple completely random strings that I have used as passwords. In your case, the attacker has 2 passwords that look very much the same, although a little changed. You are now screwed.
I just bought a new 2019 Pro, will see how that goes. I’m told the Apple TV stuff is snappy, but it’s Apple.
x86 would be great but Netflix only support listed hardware so might not be wife proof