Encrypted storage is an implementation detail of the filesystem. Once you're at the point of connecting an unlocked phone to a computer running ADB, you can just transfer files and not care about whether or not the underlying data is encrypted at rest.
Thank you for being so willing to try it, I hope to release it to Canada on Tuesday. If you are interested, I have an email list on the website, I will be sure to notify you.
No, in this analogy the punishment is aimed at Nike employees who after creating a shoe for kicking puppies also operated puppy-kicking-as-a-service with that shoe.
The people charged are the subset of the Tornado Cash devs who ran the service, not for solely developing some code.
In the EU I get an EU cell plan because it's orders of magnitude cheaper than roaming from North America when travelling for a month.
So to log into my bank I have to load the website on my device, enter my username / password, have it send the SMS 2FA, switch to my home SIM card, wait to receive the text message, switch back to my EU SIM card, ensure internet works, then submit the 2FA code to finally log in.
That assumes I haven't forgotten something to poke the SIM card out with. I couldn't find eSIM last time I went to Portugal.
Did you use a brainwallet (ie, the hash of the password as the private key)?
It looks like the funds were drained within an hour of you loading the bounty. People have made giant lookup tables of brainwallet passwords and monitor the corresponding addresses for transactions. Reddit user u/btcrobinhood is known for doing this and returning the funds.
Update: funds were not stolen. PortableSecret wasn't cracked (yet)!
What happened is: the wallet app I'm using automatically performs CoinJoin[1] when funds are received (In fact, this is their business model! They take 0.3% of the amount to automatically anonymize all inbound coin).
CoinJoin is a protocol that breaks up the sum received in tiny pieces and scatters them across a large number of "sub-wallets".
So my wallet still has the funds. Bt the 'receive' address I used looks drained, that's because it was only a temporary address to share with the sender. Funds were soon after scrambled/tumbled/anonymized.
This was an interesting experience. I spent all day thinking about what could have happened, researched and learned a bunch of stuff in the process.
Why bother with BTC? Monero implements such protections (plus many stronger ones) with TX fees in the order of a single cent, and obviously without any fees for laundering your entire balance every time you're given money.
That's a good question! I didn't think to look until you asked. It looks like it didn't, which is a bummer because then I could have asked my friends to get my photos...
I agree with you, it doesn't make any sense. AGPLv3 says it plain as day:
"you [the licensee] may remove that term."
The licensee, meaning me, or the defendants in this case, can remove any terms which impose further restrictions. The licensor (Neo4j) has given written consent to do so.