Hi Bob, That is both a great and terrible story! One really can’t make this type of story up either because it’s too bizarre.
Sorry to hear that it was a true one for you! Thanks for sharing... Rick > On Jan 3, 2017, at 4:16 PM, Bob Sneidar <bobsnei...@iotecdigital.com> wrote: > > And redundant backups are just one more vector to your data. Really, security > has to be balanced with usability. Absolute security is to never write, type, > speak or otherwise store any information you want to protect, or which might > give clues to any information you want to protect. This is of course absurd. > We sacrifice some degree of confidence for some degree of usability. I > personally do not do bit level encryption because of the reason stated below. > It's too easy to lose everything. But locking down you information as best > you can is always wise. > > By way of example, I took a phone into Apple where I had the fingerprint > recognition enabled. The touch screen was intermittent, so I had them replace > the touch screen. They did of course, first have me disable the fingerprint > recognition, and turn off Find My iPhone. I got the phone back bricked. They > had damaged the cable that goes from the security chip to the logic board, > and now the phone was impossible to restore. The chip marries itself to the > board, and even replacing the cable would not have solved the problem. > Otherwise anyone could bypass the security by simply putting a new security > chip/cable in the phone. > > Yes, too much security is a bad, bad, very bad thing. > > Bob S > _______________________________________________ use-livecode mailing list use-livecode@lists.runrev.com Please visit this url to subscribe, unsubscribe and manage your subscription preferences: http://lists.runrev.com/mailman/listinfo/use-livecode