![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
That’s interesting, never thought of that as an attack vector.
That’s interesting, never thought of that as an attack vector.
How would you set that pin on a SIM card in an iPhone?
So they took the SIM card out and got the phone number from that? I guess I didn’t realize you could do that.
I’m confused, in the article he said it was a brick to whoever has his stolen phone. How did they get his phone number to send him text messages? Did they crack the passcode and needed the iCloud password?
Wasn’t this done about 20 years ago. It’s called second life and there was big craze to get businesses in the game to pimp their stuff.
Did the bag have $$ signs on them?
It was Confederated products. I loved that movie.
Wasn’t there a language created called Esperanto that was supposed to be the world language.
Don’t even try and format code with markdown, now you have to make a post with a title.
Don’t forget India
Versed, doesn’t that make you forget things, my ex-wife used to work in a surgery center and she said when patients wake up in the middle of surgery they would get an extra dose of versed and never remember it happened.
Thanks!