This is why those FBI or whatever forced data requests without accountability. (They claimed it was illegal to make the request public) should never have been a thing. Cause what's stopping an entity from falsely claiming they're the FBI? And this is exactly what happens. Accountability exists for a reason. And it's in the government's best interest to be accountable and public (in things that makes sense to do so).
The whole "emergency request to prevent imminent harm" angle *sounds* reasonable, I suppose... if there are extensive audits of *every* such request made after the fact and heavy penalties for misuse, along with strict guidelines on how they can be used in the first place. Given that such oversight would probably not actually be enforced though, it should then not be allowed period.
@@NightKev I think a good step forward would be needing an explanation of why the data is needed in the request, preferably with evidence attached. That way the company can see "Oh yeah, someone did just make a bomb threat on this account, so giving their data to the FBI makes sense". It should also only ever be used in emergencies, and absolutely nothing else.
@@Tommy50377 That's the thing. Some cases are classified and cannot offer an explanation for why sensitive data is collected. I don't really see an easy way around this tbh. A lot of people want privacy but with total privacy comes heightened crime that won't be traceable because of that privacy we fight so hard for. People have the mindset of "oh I don't want companies seeing or sharing my data" but when its the other way around, say for in court, they want the fbi to invade other people's privacy and telephone companies to bring up past messages for justice. We can't have both total privacy and legal safety. That's why I think privacy is not really a good thing in some situations. I'd rather be safe and leave the police work easy for them than rather a company not know what i was texting someone last night. I mean, if you ain't doing anything wrong there shouldn't be a problem right? Plus its not like the company employers sit down on an afternoon reading your messages lol
"Trust but Verify". One of the first things they teach you in cyber security. Got a court order? You have the right to verify it with authorities. If someone with a badge gives you a hard time be suspicious; legit police/FBI know the rules too.
@@AL5520 They should ask themselves which costs more: Retaining a legal advisor, or getting their pants sued off by angry customers who got all their data handed over to scammers?
Probably because the actual people who handle the requests on a daily basis are overworked and underpaid, or inexperienced graduates with little analytic skills.
You probably forgot that the "company" is just a legal entity and not a superhuman, and in legal entities regular people work who can make mistakes and not know things (employees not knowing stuff is definitely the company's fault doe)
I work in IT, and I was so surprised to see how many of my users have Internet Explorer as there default browser. Another surprising thing that I learned was that a banking institution that we use requires us to use IE8 compatibility mode in order to use their website. Some users found out the hard way when they upgraded to Windows 11 and the compatibility mode features for gone.
This is why it's a good idea to wait to switch to windows 11 or any new major release, the current windows 10 works perfectly fine but it takes time for companies to revers stupid decisions like not letting people easily change the default browser. It was absurd the way changing the default browser was in windows 11, whoever came up with that idea at Microsoft shouldn't be allowed to make design decisions in the future.
I'm on win 11 and it's buggy I get an annoying audio stutter which the audio trouble shooter fixes only to return on next boot and file copy causes the drives to disappear so there's that
I absolutely love how progressively comfortable Anthony is doing videos. He’s just one of those guys you couldn’t hate even if you tried really really hard.
@@Teh-Penguin Who said I'm taking it personally? I just find it very weird. Most of the LTT cast has very charismatic, entertaining people. But nobody gets fawned over like Anthony does, and to me, it feels like people are trying to compensate for obvious things, which just makes it worse.
@@Granhier I might be wrong, but considering how much attention you pay to the subject - I think you take it personally. Me, I don't see any other reason why people would be fawning over Anthony other than because he's who he is. Your theory that this is because of his looks doesn't work out for me because if anything, the internet is the place where you get judged by your looks more than anything else. Not only that, but if he was your typical good looking guy people would suspect he gets a fanbase only because of that. All in all I think it's more productive to enjoy the positive vibes rather than to question them :)
@Carl Gunderson i mean of course that's not exactly how it works but I didn't want to write a paragraph about it . Plus either way less data does help in case of leaks
Yup, Most websites of Indian government needs IE. I consult at a company which uses open source stack and linux machines. We lost a tender bid for IT park space, because, as we found out later, their portal needs IE-6, even though it could detect DSA keyfab in Firefox, it wouldn't work unless you have IE6-7.
Honestly I think its about time that companies hire more devs to migrate to newer web technologies. As a software developer its sucks having to support IE because companies are still using it after new web standards have been laid down. Staying on IE is not only cumbersome but expensive to maintain.
@@krazymeanie it’s easy to say that but it’s expensive, time consuming, and distracting to redevelop old IE apps. This is coming from someone who did a little bit of that at my old job. Sometimes, the tools were better/more well suited for the application than they are today
@@chadkrause6574 I've also had to rebuild build old ie apps and I don't disagree with those points. It is time consuming and expensive but it's worth it in the long run. It took about 7-12 months for my team to rebuild an old ie app and I could say without a doubt, whilst it was alot of work, after it's done it's smooth sailing from there (Plus because we had to rebuild it forced us to review the code immensely so we caught alot of bugs and performance bottle necks lmao). I do agree that some apps benefit in the use of old technology but I'd say that it's pretty rare that newer technologies can't suffice it's needs. Ask anyone on my team and I'd bet they choose the rebuild over supporting ie but that's just us lol.
@@Teh-Penguin it's the frequency between 2.4 and 5 GHz. Being able to connect to both gives you more flexibility and stability. It's still the same Wi-Fi, just connecting to both types of it.
Most phones already keep the mobile data connected even on WiFi by default, albeit so that no easily perceivable connection drop is noticed between the user when switching between the two.
@@haydenw8691 I'm talking literally fusing both of those signals into 1, you're talking about the "mobile data always active" setting. I'm talking about the hyperfusion setting
ill never forget getting my apple account taken, dude just added a prepaid card via phone to the account after lying about not having a password, then took off my card, making them the primary holder. took weeks to get it back, because god forbid you convince them youre the good guy.
At least u didn't wake up one day and find all ur iCloud data wiped 😢😢😢😢😢 I even used to pay $1 a month for extra storage and since that in 2015 I decided I'd never buy an apple product
Apple products are actually worst than google in some ways for privacy. Though android gives you more potential, such as using a privacy ROM like CalyxOS with MicroG, or go ultra hatdcore with GrapheneOS. Apple knows EVERYTHING about you if you use their products.
@@levelup1279 This is a nonsense argument. Unless you use a VPN every time you go online, fake different user agents in every browser you use, block cookies and local storage objects everywhere you go online and refrain from putting any information about yourself anywhere online, you already give all relevant info about yourself away to all major tech companies just by being online. Apple knows as much about an iPhone user as Facebook knows about you, even if you don't use Facebook at all. The data kraken will get your data unless you take extremely drastic measures every time you go online.
that Dell network thingy was standard on the Omen 15" 2018-2019 (i5, 8gb, 1060 6gb, 1 terra) as the "dual network switch" in the omen command center. allowed you to give apps exclusive access to either wifi or ethernet simulataneously and was for all intents and purposes an amazing feature to have.
_“We can’t all be Louis Rossmann, because the world would be just too sassy.”_ And now you understand what it’s like to live in New York City, my own little slice of heaven.
Imagine exploring around Pompeii at night, not knowing there's a robot dog patroling, Ans all you hear is the sound of the robot getting closer and closer to you
LTT dropped the ball here on explaining what actually happened. Verified law enforcement domains were hacked, and the hackers used previous legitimate request form templates to send these new requests. This was a problem with law enforcement having terrible cybersecurity.
The studio display cable easily detaches with a quick tug. It’s just firmly fitted. It’s not a product I’d personally buy as I’m a gamer but the BS about the power cable is fake news.
@@AaronShenghao hey mistakes happen. The guys who wrote the product information on the website were just not aware that it in fact does come off. For further information just watch this explanatory video: ruclips.net/video/oHg5SJYRHA0/видео.html
@@cycl0n362 nice video man, really explained it pretty well. Apple messed up big time by not making everything clear. I'm glad people like him exist to explain stuff to newbies like me
@@ddc171 and Linus channels are making it worse by spreading false information without actually thoroughly checking before making the videos … plenty of Apple haters love it and the toxic comments section community brings hella revenue for Linus channels …
I like how not only is all our stored data legally required to have specific backdoors, but also that those back doors are operated by what amounts to a secret way of knocking.
I think the real story here isn’t “a bunch of companies give up sensitive user data to people pretending to be law enforcement,” but rather, “a bunch of companies are willing to release sensitive user data to law enforcement at the drop of a hat”
That's because they are legally obligated to do so. Administrative subpoenas, just like regular subpoenas have a penalty for failure to respond. Apple may also choose to challenge the subpoena and they have done so in the past according to their transparency report.
@@mrbanana6464 They have to respond, they don’t have to comply. You just said yourself, they have the right to challenge it. Here, they clearly immediately buckled without any pressure to someone simply because they claimed to be the government
@@tommykarrick9130 The email came from a compromised email account belonging to the FBI, not some random domain. Typically any objections, modifications, or motions to quash a subpoena occur when the recipient finds the relevancy, admissibility, and specificity of the subpoena materials to be unreasonable. Apple's legal department deals with reviewing these requests and not with verification.
@@mrbanana6464 that’s the entire point of what I’m saying. Even if they believed the emails to be real, they shouldn’t so easily cave and give away private information to law enforcement with a single email. I’m saying even if it was real, it would be bad.
@God of Girth I wouldn't go that far (cause they tried to make an interesting design and kinda did, so they deserve props for that). The issue is that they put the bare minimum effort in and clearly didn't even do basic research on the demographic that they're targeting. It's clear by the glued connectors, really shoddy top plate, unlubed stabs, cramped layout, and north facing LED's. Had they even done a lil research then we wouldn't have them messed up as many basic things.
Dual networking is actually huge. We have a ton of server and VM based applications we use at my workplace and they HATE transferring from a wired to wireless connection when we dock or undock our laptops. Being able to just do both would be incredible
I'm a bit pessimistic about Intel's first gen gpu's, but I have hope. The Moore Threads thing can be dismissed for now, because native Chinese fabs are limited to 14nm at best, in the case of SMIC semiconductor, so it won't be competitive just yet. There's hope though, maybe in the future.
@@danielharvison7510 I happen to know for a fact (unless I'm not supposed to know) that China are producing 7nm processors as of Late Feb this year. While I agree these first graphics cards will be relatively low on the pecking order it's the first step into providing an alternative in the mid-range GPU market. The name is I believe a corny take on Moores law . Anyway just thought I'd post what little I know.
That is so strange that some basic data is very private in another country.. I am used to that I can check who have matrimonial contracts, which property someone owns and how much loan they took etc.. it is public data in Estonia :)
Hilarious to me how "home addresses!" are seen as a huge data breach, considering the phone company used to literally publish a book with everybody's address in it and nobody gave much of a shit.
Different times. There was no cancel culture or online celebrities in the 90's. So the only public figures available to terrorize were already expected to have bodyguards and security. Also less tools to do so back then
@@jb888888888 it never cost me anything other than the time to say no when they would ask if I wanted it listed and ask me what I wanted it listed as if I wanted to. It doesn't even have to be your name.
I don't know if anyone has ever said this before; but, I have loved seeing Anthony go from Lawful Evil, to Neutral Evil, and slowly and ever more casually to Chaotic Evil....
This is why you don't even establish a policy for ANYONE to have access to personal information. There is no such thing as "good guy"/"bad guy." It's only the bad guy, trying to get your information, and the so-called-"good guy" that you hope is good enough to prevent them from getting it. This is why policies like this are bad bad bad bad bad bad. The "good guys" get 40 hr. s a week to crunch on this shit, meanwhile, the actual bad guys why are looking to do harm to you have all day every day, weekends and holidays included. Giving government automatic (key word here is that one) access to your sensitive data is the worst idea ever, but no one ever talks about it.
I understand it was a joke, but the Pompeii looting is a serious and real issue, with a lot of tourists (mainly from North America) thinking they can just break down a piece and get it back home, and it's extremely damaging to one of the best preserved archeological sites in history.
its a big difference between having your user's data stolen from you and having your whole companies existence created for the objective to sell your user's data (Facebook , Google, Instagram, etc.)
Wrong on two fronts. First off, LTT misrepresented the story. What actually happened was that hackers got into verified law enforcement domains to send *seemingly legitimate in every way* requests. The problem here was that law enforcement had terrible cybersecurity, and that should be the focus. Second, companies like Google and Facebook are not in the business of selling your data. They're in the ad selling business, and giving up your data to others means they lose their unique edge. It's still creepy what is collected about you and known by those companies, but they aren't selling it to others.
I most of the time forget to hit the like button, but this very funny episode with this very funny and dynamic duo (who's Batman and who's Robyn?!) forced me to do so. Thank you guys! And l love dear words too.. it just sets the mood in the context perfectly.
Double network thing is actually an android feature already, this can be enabled on pretty much every phone. Enable developer settings and search for dual-channel download and intelligent network connection.
Great reporting, LMG! It sure sounds like these companies sent out private data to some random hackers whenever requested, right? Several of the companies listed reported they do this *only* for emails sent from verified law enforcement addresses. Not a word on all these dumb cops who clicked on some random .exe and got their accounts pwned, for "hackers" to use to request data. What would you do if you worked at one of these companies and received the 50th email this month from the same cop, following the same template?
Exactly. It's easy to put the blame on companies for not taking privacy seriously, without considering what caused this in the first place. With EDRs it's even more problematic, because there is a time limit; If you spend time to verify the source it could have real consequences in case it was a valid request. There's a lot of pressure. There's definitely something to be done on both sides, though. Better communication channels that makes it more difficult for MITM and impersonation attacks, as well as providing separate secure channels for sending this data. Email is just not cutting it. Of course it's a balance between speed and security. Speed is of utmost importance for emergencies, but security is important to avoid attacks like this.
The problem isn’t tech companies, it’s the law that says they have to hand over information to law enforcement immediately if they claim it’s an EDR, which is a privacy nightmare.
This is why companies should not comply with these orders unless it’s in paper and handed directly to a legal representative of the company or the head of the company. It poses a MASSIVE security risk.
I bought a Huawei honor view 20 in 2018 for 200$ , it plays every game in ultra quality and it doesn't heat up because of the liquid cooling .During the pandemic they extended my phone warranty for an extra 3 months (impeccable service) . Apple probably made some connections to kick huawei out of the US because they would've definitely taken over .
@@fusokku9212 It's apparently somewhat of a marketing gimmick. It's a *single drop* of evaporated water enclosed in a heat pipe. I'm sure it gets better heat transfer than if there were no pipe at all, but I'm willing to bet a solid copper heat pipe would have done even better.
Thanks for the comic sands look on the forms I went there and it was already removed I guess that bug got fixed. Thanks to that very detailed bug report that I heard about on the WAN show.
I would love to see the looter looking for old pottery who suddenly comes upon expensive robots and drones that go right to them. Bonus! Thanks Pompeii.
I love that Anthony had to go serious with the concrete jungle bit. What an empath. Anthony was the perfect addition to this channel. I have to say lately seeing how unafraid they are to take on apple totally increased my respect for this channel.
The internet connection combining thing has been built into windows since at least 7. You just change multiple connections to the same interface metric.
Anthony's windows 11 untamed agresiveness is my favorite if there ever was a channel dedicated to his uncensored rants i'd like, subscribe, hit the bell, share and even (perhaps) disable adblock
@@Konkov cope lmao 🤣 The iPhone SE and the Galaxy S2x FE edition are both reasonably priced options but all flagship phones over $1000 are way too expensive.
@@Konkov while I’d understand that for a laptop or even a tablet, that is next to useless specs for a phone. If you have money to burn sure, but anyone wanting actual value out of their products could not justify having that kind of phone
The two Internet connections at the same time is extremely interesting if it also means you can have two different VPNs open at the same time. Often you need to be connected to different clients with different VPNs, even if typically one is just to monitor something. Or maybe in a home office setting you want to be connected to your company's network and the client's.
The VPN I use at work and have been setting up for folks for a long while (fortigate) doesn't work at all with express connect on dells. We recently switch from using HP to Dell and I could not get some of the laptops to work on the VPN. Turns out you uninstall the Express Connect software and everything works again. It's garbage if you ask me. I pulled my hair out staring at packet tracers for a day so I maybe biased. That's the first thing I uninstall when setting up a new laptop for anyone now. Express Connect sucks
@@ohioplayer-bl9em networking is magic voodoo bullshit 80% of the time. One client's VPN refuses to work with a particular ISP (obviously the one I use privately and professionally). Took me an incredibly long time to find out that this particular VPN doesn't work wit IPv6 and the standard MTU setting basically everyone uses. Reduce it by 5 and the VPN works fine.
The Dell two network thing is huge. Corporate VPNs suck at setting up passthroughs. Being able to use my wired for intranet connections while still maintaining a real connection to the internet would be outstanding.
i love Anthony's Tech Linked Episodes. Also how the fuck do mega corps give information to fake authorities?!?!?! i mean literally, how does that happen? im asking a genuine question because im completely baffled as to how thats even possible. is there not a process for a company to give sensitive info to law enforcement? is there not some kind of confirmation happening like contacting that actual Agency to determine whether the people requesting the info are in fact legit? did these companies receive an email from these supposed Law Enforcement Agencies asking for sensitive data and Apple and them were just like, "yea ok, thats legit." Like i am completely fucking confused.... it doesnt even make sense!!!! They were hackers so how did they request the info? if it was in person face-to-face, then the companies should have contacted the agency itself confirming the identity of said individuals. if it was thru email or over the internet somehow... THEN THESE COMPANIES SHOULD HAVE CONTACTED THE ACTUAL FUCKING AGENCY CONFIRMING THE LEGITIMACY OF THE REQUEST!!!!! WHAT IN THE ACTUAL FUCK?!?!?!!??!
with the wifi + ethernet thing, killer already had this in gaming laptops and called it double shot pro, i own a sager (rebranded clevo) that has the double shot pro option from killer
I have to give Samsung credit. They are doing good with right to repair. Let's see how well this will actually hold up in the long run. It might actually make me buy a Samsung phone.
I CAN'T BELIEVE IT! When I could not get into my acc w a correct password, (many people claim it), I spent for 1 month, and a telephone operator changed to a senior engineer, and we finally gave up after 1 hour or more time. They said to keep it really strong, Apple doesn't keep my password. Only I can get into it. (and I could not.) He said actually he made his account 3 times, sometimes it happens ... or like that. I made a new acc... but, WHAT?
The perfect entry point into the mechanical keyboard community is the GMMK or the new GMMK 2. Glorious also have the glorious guild forums for enthusiasts, as part of a loyalty programme.
Anthony doesn't go to parties, parties come to him! yeah boiiii
Anthony doesn't bgo to parties he is the party
That's a nightmare scenario if I ever heard one before.
I mean, he probably can't get up a flight of stairs to reach a party. Not without suffering a mild heart attack.
@@blunderingfool why ya gotta be an a*s?
@@blunderingfool plenty of stairs at LMG, don't be fat shaming.
This is why those FBI or whatever forced data requests without accountability. (They claimed it was illegal to make the request public) should never have been a thing. Cause what's stopping an entity from falsely claiming they're the FBI? And this is exactly what happens. Accountability exists for a reason. And it's in the government's best interest to be accountable and public (in things that makes sense to do so).
lots of crooked shit makes plenty of sense, as long as you remember it's crooked shit. and if its any federal agency, it's 100% some crooked shit
The whole "emergency request to prevent imminent harm" angle *sounds* reasonable, I suppose... if there are extensive audits of *every* such request made after the fact and heavy penalties for misuse, along with strict guidelines on how they can be used in the first place. Given that such oversight would probably not actually be enforced though, it should then not be allowed period.
@@NightKev I think a good step forward would be needing an explanation of why the data is needed in the request, preferably with evidence attached. That way the company can see "Oh yeah, someone did just make a bomb threat on this account, so giving their data to the FBI makes sense". It should also only ever be used in emergencies, and absolutely nothing else.
Identification and a court approved warrant is required, we went through that at Nextel, standard policy everywhere in the communication industry.
@@Tommy50377 That's the thing. Some cases are classified and cannot offer an explanation for why sensitive data is collected. I don't really see an easy way around this tbh. A lot of people want privacy but with total privacy comes heightened crime that won't be traceable because of that privacy we fight so hard for. People have the mindset of "oh I don't want companies seeing or sharing my data" but when its the other way around, say for in court, they want the fbi to invade other people's privacy and telephone companies to bring up past messages for justice. We can't have both total privacy and legal safety. That's why I think privacy is not really a good thing in some situations. I'd rather be safe and leave the police work easy for them than rather a company not know what i was texting someone last night. I mean, if you ain't doing anything wrong there shouldn't be a problem right? Plus its not like the company employers sit down on an afternoon reading your messages lol
"Trust but Verify". One of the first things they teach you in cyber security.
Got a court order? You have the right to verify it with authorities. If someone with a badge gives you a hard time be suspicious; legit police/FBI know the rules too.
True but that takes time and requires more workers. You expect them to spend money on your privacy?
@@AL5520 They should ask themselves which costs more: Retaining a legal advisor, or getting their pants sued off by angry customers who got all their data handed over to scammers?
@@danielharvison7510 They ask themselves that question all the time. It's why option 2 is the common outcome. It's cheaper.
They know the rules but VERY rarely play by them. 0 accountability on the 3 letter agencies of countries is very bad for the people that live in them.
@@LKN117 For the little guy this is true. But big companies are big employers and that gains a gentler touch.
Man half the reason I watch these days is cuz of the banter. Love the dynamics between the LTT team.
you love me?
@@Dynamicsz_ yes I do
Www
@@potatoes5829 now kith
@@Dynamicsz_ love you
How do these multi-million dollar tech companies keep falling for the hacker equivalent of showing off a fake ID to a bouncer at a club?
Probably because the actual people who handle the requests on a daily basis are overworked and underpaid, or inexperienced graduates with little analytic skills.
Apple devices have a lot of dedicated hacker groups, it's nothing strange ,people think that iphones are safe...those people are so delusional
You probably forgot that the "company" is just a legal entity and not a superhuman, and in legal entities regular people work who can make mistakes and not know things (employees not knowing stuff is definitely the company's fault doe)
@@Thermalions Great point, social hacking is a real problem.
I mean are they really hackers. Social engineering (see: lying) is one of oldest tricks in the book
I work in IT, and I was so surprised to see how many of my users have Internet Explorer as there default browser. Another surprising thing that I learned was that a banking institution that we use requires us to use IE8 compatibility mode in order to use their website. Some users found out the hard way when they upgraded to Windows 11 and the compatibility mode features for gone.
This is why it's a good idea to wait to switch to windows 11 or any new major release, the current windows 10 works perfectly fine but it takes time for companies to revers stupid decisions like not letting people easily change the default browser. It was absurd the way changing the default browser was in windows 11, whoever came up with that idea at Microsoft shouldn't be allowed to make design decisions in the future.
Wait, people are actually *considering* switching to 11? Isn't it made entirely with electron?
dats any major update in general. i do the same with ios. usually wait months or a yr till i feel its stable enuff and all the crap is gone.
Yeah... I'm still staying with 8.1... intentionally. I'm not the least bit ok with not having control over updates
I'm on win 11 and it's buggy I get an annoying audio stutter which the audio trouble shooter fixes only to return on next boot and file copy causes the drives to disappear so there's that
I waited a good 2½ years after windows 10 released to finally jump ship from windows 7 and I'm still not too happy about it.....
I absolutely love how progressively comfortable Anthony is doing videos. He’s just one of those guys you couldn’t hate even if you tried really really hard.
He was an instant celebrity with the very first video he's done. The most lovable of LTT staff and they're all pretty cute.
I like Anthony. The comments obsession with him however has the exact opposite effect.
@@Granhier Let others express their affection without taking it personally :)
@@Teh-Penguin Who said I'm taking it personally? I just find it very weird. Most of the LTT cast has very charismatic, entertaining people. But nobody gets fawned over like Anthony does, and to me, it feels like people are trying to compensate for obvious things, which just makes it worse.
@@Granhier I might be wrong, but considering how much attention you pay to the subject - I think you take it personally. Me, I don't see any other reason why people would be fawning over Anthony other than because he's who he is. Your theory that this is because of his looks doesn't work out for me because if anything, the internet is the place where you get judged by your looks more than anything else. Not only that, but if he was your typical good looking guy people would suspect he gets a fanbase only because of that. All in all I think it's more productive to enjoy the positive vibes rather than to question them :)
That's why privacy is important. Data leaks happen everytime and the only way to be safe would be to have less and less data on their servers
Uses VPN 🥴
The only real way of privacy is going offline
@Carl Gunderson i mean of course that's not exactly how it works but I didn't want to write a paragraph about it . Plus either way less data does help in case of leaks
The problem with internet explorer 8 is that there are tons of old internal business sites that use it. Every company I have worked for has them
Yup, Most websites of Indian government needs IE. I consult at a company which uses open source stack and linux machines. We lost a tender bid for IT park space, because, as we found out later, their portal needs IE-6, even though it could detect DSA keyfab in Firefox, it wouldn't work unless you have IE6-7.
Honestly I think its about time that companies hire more devs to migrate to newer web technologies. As a software developer its sucks having to support IE because companies are still using it after new web standards have been laid down. Staying on IE is not only cumbersome but expensive to maintain.
@@krazymeanie it’s easy to say that but it’s expensive, time consuming, and distracting to redevelop old IE apps. This is coming from someone who did a little bit of that at my old job. Sometimes, the tools were better/more well suited for the application than they are today
@@chadkrause6574 I've also had to rebuild build old ie apps and I don't disagree with those points. It is time consuming and expensive but it's worth it in the long run. It took about 7-12 months for my team to rebuild an old ie app and I could say without a doubt, whilst it was alot of work, after it's done it's smooth sailing from there (Plus because we had to rebuild it forced us to review the code immensely so we caught alot of bugs and performance bottle necks lmao). I do agree that some apps benefit in the use of old technology but I'd say that it's pretty rare that newer technologies can't suffice it's needs. Ask anyone on my team and I'd bet they choose the rebuild over supporting ie but that's just us lol.
my local McDonald's uses Windows 7.
“Everyone would be upset, all the time”
EXACTLY.
the hackers must of been a group of children stacked in a trench coat with aviator sunglasses and a fake mustache. it's the only way
I do love a good Bavarian Fire Drill.
I was thinking of Eric Andre at a dealership for some reason.
🤣🤣🤣🤣🤣🤣🤣
Must have been.
I feel like that double wifi thing should come into play asap. I've had hyperfusion on the rog 3 which uses wifi and data together
I can't think of a good use-case for this. When would you have access to two WiFi signals that do not converge on the same router/modem?
@@Teh-Penguin it's the frequency between 2.4 and 5 GHz. Being able to connect to both gives you more flexibility and stability. It's still the same Wi-Fi, just connecting to both types of it.
@@flamevell3258 I have this option in my Oppo phone. It's really useful.
Most phones already keep the mobile data connected even on WiFi by default, albeit so that no easily perceivable connection drop is noticed between the user when switching between the two.
@@haydenw8691 I'm talking literally fusing both of those signals into 1, you're talking about the "mobile data always active" setting. I'm talking about the hyperfusion setting
100 percent would buy if Hyper X sell grass keyboard and mice as decoration
Mold your own out of terra cotta and spread some chia seeds on them.
ill never forget getting my apple account taken,
dude just added a prepaid card via phone to the account after lying about not having a password,
then took off my card, making them the primary holder.
took weeks to get it back, because god forbid you convince them youre the good guy.
At least u didn't wake up one day and find all ur iCloud data wiped 😢😢😢😢😢 I even used to pay $1 a month for extra storage and since that in 2015 I decided I'd never buy an apple product
@@Kademo That's why you only trust your files to local storage.
That's why you stop using apple products
Apple products are actually worst than google in some ways for privacy. Though android gives you more potential, such as using a privacy ROM like CalyxOS with MicroG, or go ultra hatdcore with GrapheneOS.
Apple knows EVERYTHING about you if you use their products.
@@levelup1279 This is a nonsense argument. Unless you use a VPN every time you go online, fake different user agents in every browser you use, block cookies and local storage objects everywhere you go online and refrain from putting any information about yourself anywhere online, you already give all relevant info about yourself away to all major tech companies just by being online. Apple knows as much about an iPhone user as Facebook knows about you, even if you don't use Facebook at all. The data kraken will get your data unless you take extremely drastic measures every time you go online.
Anthony must be protected at all costs! 🙌🏼
Anthony must be unleashed upon the masses!
that Dell network thingy was standard on the Omen 15" 2018-2019 (i5, 8gb, 1060 6gb, 1 terra) as the "dual network switch" in the omen command center. allowed you to give apps exclusive access to either wifi or ethernet simulataneously and was for all intents and purposes an amazing feature to have.
_“We can’t all be Louis Rossmann, because the world would be just too sassy.”_ And now you understand what it’s like to live in New York City, my own little slice of heaven.
Imagine exploring around Pompeii at night, not knowing there's a robot dog patroling, Ans all you hear is the sound of the robot getting closer and closer to you
Fresh tech news right off the notification 🔔
Are they really “hackers” if the companies just hand over the information lmao
social engineering
If you have a million dollar company you will try to hide as many things you dont want the public to know. Its simple the news are likely lacking.
@@karmanderdimdung223 Doesn't that make them engineers?
@@NirateGoel correct. and that's why every bus conductor should use the title Dr. before their name.
LTT dropped the ball here on explaining what actually happened. Verified law enforcement domains were hacked, and the hackers used previous legitimate request form templates to send these new requests. This was a problem with law enforcement having terrible cybersecurity.
I can totally imagine a world where we're all louis Rossman and in that world, Apple doesn't sell computers without detachable power cords.
The studio display cable easily detaches with a quick tug. It’s just firmly fitted. It’s not a product I’d personally buy as I’m a gamer but the BS about the power cable is fake news.
@@blanchbacker Dude, Apple stated it isn't detached on their OWN website.
@@AaronShenghao hey mistakes happen.
The guys who wrote the product information on the website were just not aware that it in fact does come off. For further information just watch this explanatory video: ruclips.net/video/oHg5SJYRHA0/видео.html
@@cycl0n362 nice video man, really explained it pretty well. Apple messed up big time by not making everything clear. I'm glad people like him exist to explain stuff to newbies like me
@@ddc171 and Linus channels are making it worse by spreading false information without actually thoroughly checking before making the videos … plenty of Apple haters love it and the toxic comments section community brings hella revenue for Linus channels …
I like how not only is all our stored data legally required to have specific backdoors, but also that those back doors are operated by what amounts to a secret way of knocking.
I think the real story here isn’t “a bunch of companies give up sensitive user data to people pretending to be law enforcement,” but rather, “a bunch of companies are willing to release sensitive user data to law enforcement at the drop of a hat”
Including Apple that's all about "Privacy, Privacy, Privacy!"
That's because they are legally obligated to do so. Administrative subpoenas, just like regular subpoenas have a penalty for failure to respond. Apple may also choose to challenge the subpoena and they have done so in the past according to their transparency report.
@@mrbanana6464 They have to respond, they don’t have to comply. You just said yourself, they have the right to challenge it. Here, they clearly immediately buckled without any pressure to someone simply because they claimed to be the government
@@tommykarrick9130 The email came from a compromised email account belonging to the FBI, not some random domain. Typically any objections, modifications, or motions to quash a subpoena occur when the recipient finds the relevancy, admissibility, and specificity of the subpoena materials to be unreasonable. Apple's legal department deals with reviewing these requests and not with verification.
@@mrbanana6464 that’s the entire point of what I’m saying. Even if they believed the emails to be real, they shouldn’t so easily cave and give away private information to law enforcement with a single email. I’m saying even if it was real, it would be bad.
Those NZXT keybs seem underwhelming, but hey at least NZXT didn't give hackers sensitive information when prompted to!
Wonder if they include screw holes that go through a power plane. They definitely are following the zero airflow model NZXT seems to love too.
Look up RandomFrankP’s vid on them apparently they’re not so great.
@@MDG509_ I've seen quite a bit of coverage on this board and everyone's take away is that it's pretty bad.
@God of Girth I wouldn't go that far (cause they tried to make an interesting design and kinda did, so they deserve props for that).
The issue is that they put the bare minimum effort in and clearly didn't even do basic research on the demographic that they're targeting. It's clear by the glued connectors, really shoddy top plate, unlubed stabs, cramped layout, and north facing LED's. Had they even done a lil research then we wouldn't have them messed up as many basic things.
Always ready for some fresh tech news
Someone: Dude you're so sweaty pls touch grass
Me with a TCH Grass keyboard:
Dual networking is actually huge. We have a ton of server and VM based applications we use at my workplace and they HATE transferring from a wired to wireless connection when we dock or undock our laptops. Being able to just do both would be incredible
4:47 Intel, Moore Threads, welcome to the GPU club. Hope you enjoy your stay and become a great option for future PC builders!
I'm a bit pessimistic about Intel's first gen gpu's, but I have hope. The Moore Threads thing can be dismissed for now, because native Chinese fabs are limited to 14nm at best, in the case of SMIC semiconductor, so it won't be competitive just yet.
There's hope though, maybe in the future.
@@danielharvison7510 I happen to know for a fact (unless I'm not supposed to know) that China are producing 7nm processors as of Late Feb this year.
While I agree these first graphics cards will be relatively low on the pecking order it's the first step into providing an alternative in the mid-range GPU market.
The name is I believe a corny take on Moores law . Anyway just thought I'd post what little I know.
I want that NZXT handheld
That is so strange that some basic data is very private in another country.. I am used to that I can check who have matrimonial contracts, which property someone owns and how much loan they took etc.. it is public data in Estonia :)
"April fools! I don't go to parties." made me lol
Hilarious to me how "home addresses!" are seen as a huge data breach, considering the phone company used to literally publish a book with everybody's address in it and nobody gave much of a shit.
Different times. There was no cancel culture or online celebrities in the 90's. So the only public figures available to terrorize were already expected to have bodyguards and security. Also less tools to do so back then
Only if you wanted to be in it. I know I opted out. Damn I'm old.
Swatting wasn't a thing back then as well. World has changed considerably, and a lot more could be done with sensitive data now than back in the day.
@@TurncoatTony AIR it cost extra to have an unlisted number.
@@jb888888888 it never cost me anything other than the time to say no when they would ask if I wanted it listed and ask me what I wanted it listed as if I wanted to. It doesn't even have to be your name.
Hyper X's TCH Grass keycaps is hilarious
1:54 "We can't all be Louis Rossmann, the world would just be too sassy, could you imagine? Everyone would be upset all the time" 😂
I don't know if anyone has ever said this before; but, I have loved seeing Anthony go from Lawful Evil, to Neutral Evil, and slowly and ever more casually to Chaotic Evil....
Anthony is such a great host!
that's what I'm sayyyyiiing
4:09 you're welcome
I unironically want a few of those keycaps lmao
Man the first shot of the robot dog in those ruins gave me really heavy Talos Principle vibes
This is why you don't even establish a policy for ANYONE to have access to personal information.
There is no such thing as "good guy"/"bad guy." It's only the bad guy, trying to get your information, and the so-called-"good guy" that you hope is good enough to prevent them from getting it. This is why policies like this are bad bad bad bad bad bad. The "good guys" get 40 hr. s a week to crunch on this shit, meanwhile, the actual bad guys why are looking to do harm to you have all day every day, weekends and holidays included.
Giving government automatic (key word here is that one) access to your sensitive data is the worst idea ever, but no one ever talks about it.
4:59 "With 1080p League Of Legends Demo"
Verge PC Guide: Best Benchmark Game Ever!
Microsoft is planning a new naming scheme for their future Windows versions. The version after MS Windows 11 will be MS Edge 12.
The next with just be called EDGE...
I wouldn't be shocked if they did something that silly, don't really mind since I'm moved over to Linux now, but it'd still be a good laugh
I understand it was a joke, but the Pompeii looting is a serious and real issue, with a lot of tourists (mainly from North America) thinking they can just break down a piece and get it back home, and it's extremely damaging to one of the best preserved archeological sites in history.
>Mainly from North America
Why am I not surprised 😂
The robot dogs guarding something gives me Generation Zero vibes
Those Boston dynamic dogs are the first that's gonna be looted.
its a big difference between having your user's data stolen from you and having your whole companies existence created for the objective to sell your user's data (Facebook , Google, Instagram, etc.)
Wrong on two fronts. First off, LTT misrepresented the story. What actually happened was that hackers got into verified law enforcement domains to send *seemingly legitimate in every way* requests. The problem here was that law enforcement had terrible cybersecurity, and that should be the focus. Second, companies like Google and Facebook are not in the business of selling your data. They're in the ad selling business, and giving up your data to others means they lose their unique edge. It's still creepy what is collected about you and known by those companies, but they aren't selling it to others.
I most of the time forget to hit the like button, but this very funny episode with this very funny and dynamic duo (who's Batman and who's Robyn?!) forced me to do so.
Thank you guys! And l love dear words too.. it just sets the mood in the context perfectly.
Double network thing is actually an android feature already, this can be enabled on pretty much every phone. Enable developer settings and search for dual-channel download and intelligent network connection.
Great reporting, LMG! It sure sounds like these companies sent out private data to some random hackers whenever requested, right? Several of the companies listed reported they do this *only* for emails sent from verified law enforcement addresses. Not a word on all these dumb cops who clicked on some random .exe and got their accounts pwned, for "hackers" to use to request data. What would you do if you worked at one of these companies and received the 50th email this month from the same cop, following the same template?
Social Engineering is one of those things to keep training, especially people who aren't into being cautious, which is a stark majority.
Exactly. It's easy to put the blame on companies for not taking privacy seriously, without considering what caused this in the first place. With EDRs it's even more problematic, because there is a time limit; If you spend time to verify the source it could have real consequences in case it was a valid request. There's a lot of pressure.
There's definitely something to be done on both sides, though. Better communication channels that makes it more difficult for MITM and impersonation attacks, as well as providing separate secure channels for sending this data. Email is just not cutting it. Of course it's a balance between speed and security. Speed is of utmost importance for emergencies, but security is important to avoid attacks like this.
The problem isn’t tech companies, it’s the law that says they have to hand over information to law enforcement immediately if they claim it’s an EDR, which is a privacy nightmare.
This is why companies should not comply with these orders unless it’s in paper and handed directly to a legal representative of the company or the head of the company. It poses a MASSIVE security risk.
5:50 I waited for something like that.
I bought a Huawei honor view 20 in 2018 for 200$ , it plays every game in ultra quality and it doesn't heat up because of the liquid cooling .During the pandemic they extended my phone warranty for an extra 3 months (impeccable service) . Apple probably made some connections to kick huawei out of the US because they would've definitely taken over .
I had to Google to check if that the "liquid cooling" comment wasn't an April Fool's joke.
i didn't know that some cellphones have liquid cooling. cool
@@fusokku9212 It's apparently somewhat of a marketing gimmick. It's a *single drop* of evaporated water enclosed in a heat pipe. I'm sure it gets better heat transfer than if there were no pipe at all, but I'm willing to bet a solid copper heat pipe would have done even better.
@@GSBarlev well my phone doesn't heat up when playing pubg or call of duty on Ultra graphics on a 200$ phone so it's probably working.
Couldn’t it be CCP funded phone to grab westerner data?
Thanks for the comic sands look on the forms I went there and it was already removed I guess that bug got fixed. Thanks to that very detailed bug report that I heard about on the WAN show.
4:10 Louis Rossmann really channeling through 🤣
I would love to see the looter looking for old pottery who suddenly comes upon expensive robots and drones that go right to them. Bonus! Thanks Pompeii.
I love that Anthony had to go serious with the concrete jungle bit. What an empath. Anthony was the perfect addition to this channel. I have to say lately seeing how unafraid they are to take on apple totally increased my respect for this channel.
The internet connection combining thing has been built into windows since at least 7. You just change multiple connections to the same interface metric.
Damn, hackers. You did it again.
"I don't wanna be upset all the time."
LMAO
an Anthony a day keeps the stress away!!
I usually not one for smiling, but I did a bit here. Thanks Anthony.
Also, the authorities just might be worse than hackers.
Anthony's windows 11 untamed agresiveness is my favorite
if there ever was a channel dedicated to his uncensored rants i'd like, subscribe, hit the bell, share and even (perhaps) disable adblock
April Fools! We're not actually cops
Because of privacy I use add blocker. What do you think about that?
Have you tried sponsor block?
Wasn't Samsung always pretty good for parts?
I did get a chuckle out of Razer's Batman & Robin reference with the suit-up sequence.
Concrete jungles tend to offer enough oppertunity to touch a certain kind of grass
Anthony finally hosted one again! yay!
ah, the one reason to pick a 2x priced apple phone instead of another...
another what? 2x priced samsung phone?
@@krazymeanie 16gb of ram 120hz 4K display is not overpriced
@@Konkov cope lmao 🤣
The iPhone SE and the Galaxy S2x FE edition are both reasonably priced options but all flagship phones over $1000 are way too expensive.
@@Konkov 16 gb of RAM is as useless as 4k display on a phone and both of those things drain battery, waste of money
@@Konkov while I’d understand that for a laptop or even a tablet, that is next to useless specs for a phone. If you have money to burn sure, but anyone wanting actual value out of their products could not justify having that kind of phone
The spot dogs at Pompeii remind me of Breath of the Wild guardians...
The two Internet connections at the same time is extremely interesting if it also means you can have two different VPNs open at the same time. Often you need to be connected to different clients with different VPNs, even if typically one is just to monitor something. Or maybe in a home office setting you want to be connected to your company's network and the client's.
The VPN I use at work and have been setting up for folks for a long while (fortigate) doesn't work at all with express connect on dells. We recently switch from using HP to Dell and I could not get some of the laptops to work on the VPN. Turns out you uninstall the Express Connect software and everything works again. It's garbage if you ask me. I pulled my hair out staring at packet tracers for a day so I maybe biased. That's the first thing I uninstall when setting up a new laptop for anyone now. Express Connect sucks
@@ohioplayer-bl9em networking is magic voodoo bullshit 80% of the time.
One client's VPN refuses to work with a particular ISP (obviously the one I use privately and professionally). Took me an incredibly long time to find out that this particular VPN doesn't work wit IPv6 and the standard MTU setting basically everyone uses. Reduce it by 5 and the VPN works fine.
What if for April Fools they didn't give us the tech news?
So that's what I have to do to avoid getting forcibly upgraded to Windows 11! That's not a bug it's a feature!
it's a feature that no one wants
The Dell two network thing is huge. Corporate VPNs suck at setting up passthroughs. Being able to use my wired for intranet connections while still maintaining a real connection to the internet would be outstanding.
Louis Rossman reference was top notch. Top notch
I have to say, the MTT cards visually look amazing. Way better than the rgb nonsense companies make these days
i think that's what the Server AMD cards look like
Man, I love how unhinged Anthony gets in these videos
"We're talking about posting a link here." gave me Ted Lasso/Allen Iverson vibes!
1:28
why is the page in comic sans lmfao
i love Anthony's Tech Linked Episodes. Also how the fuck do mega corps give information to fake authorities?!?!?! i mean literally, how does that happen? im asking a genuine question because im completely baffled as to how thats even possible. is there not a process for a company to give sensitive info to law enforcement? is there not some kind of confirmation happening like contacting that actual Agency to determine whether the people requesting the info are in fact legit? did these companies receive an email from these supposed Law Enforcement Agencies asking for sensitive data and Apple and them were just like, "yea ok, thats legit." Like i am completely fucking confused.... it doesnt even make sense!!!! They were hackers so how did they request the info? if it was in person face-to-face, then the companies should have contacted the agency itself confirming the identity of said individuals. if it was thru email or over the internet somehow... THEN THESE COMPANIES SHOULD HAVE CONTACTED THE ACTUAL FUCKING AGENCY CONFIRMING THE LEGITIMACY OF THE REQUEST!!!!! WHAT IN THE ACTUAL FUCK?!?!?!!??!
This is very disappointing that even spending 1000usd is not enough to safeguard your data , but I don’t have a choice now.
I am missing blackberry os
pinephone on linux is a fair bit less
That "**** you, Riley" caught me off-guard even though I watched LTT's April Fool's video before this XD
My favorite part of this video is that the news articles are in Comic Sans
Happy Ramadan!
Who else loves Anthony?
6:30 gives me The Talos Principle vibes. Not sure if good thing or bad thing 😬
with the wifi + ethernet thing, killer already had this in gaming laptops and called it double shot pro, i own a sager (rebranded clevo) that has the double shot pro option from killer
I have to give Samsung credit. They are doing good with right to repair. Let's see how well this will actually hold up in the long run. It might actually make me buy a Samsung phone.
@Carl Gunderson not gonna lie, same here
first
You actually are first
Goddammit
Bozo
6:50 that’s a boring job for a robot dog 🐶.
I CAN'T BELIEVE IT! When I could not get into my acc w a correct password, (many people claim it), I spent for 1 month, and a telephone operator changed to a senior engineer, and we finally gave up after 1 hour or more time. They said to keep it really strong, Apple doesn't keep my password. Only I can get into it. (and I could not.) He said actually he made his account 3 times, sometimes it happens ... or like that. I made a new acc... but, WHAT?
"customer-first care" is an excellent way to spin right to repair into a positive marketing thing for these greedy corporations
How can they not be sure or investigate or ensure they're real authorities
4:09 Andy goes savage for second video straight
*a year in, and windows 11 still has the stupid audio crackling and desync info for me*
And i *CANNOT* find a solution
1:25 is that comic sans? A reference to the fact many Samsung users use it as their default font? If so, amazing editorial direction!
We need a LTT store "Companies aren't your friends" shirt that looks like the more you know graphic.
The perfect entry point into the mechanical keyboard community is the GMMK or the new GMMK 2. Glorious also have the glorious guild forums for enthusiasts, as part of a loyalty programme.
0:50 ah, the hackers got a phone book with emails