- #36
dangerbird
- 38
- 0
Ryan_m_b said:Dangerbird please use proper capitalisation and punctuation when writing a post e.g.
I'm sorry I'm just terrible at english i failed that course. I'll do the best i can though.
Ryan_m_b said:Dangerbird please use proper capitalisation and punctuation when writing a post e.g.
dangerbird said:Naw its just to eliminate any crazy rare stuff like in a million chance stuff from happening its not that there's iminent danger and i realize that that's why its not paranoia see
nah I am just weird lollostcauses10x said:I could easly argue this the other way at Paranoia or compulsion..
If no iminent danger, and crazy rare stuff : why bother unless some thing is nagging or driving you ??
Most people would go on about there business without worrying about such. Yet to act upon such: some thing is worrying you, is it not?
jhae2.718 said:I'm typing this message from a non-networked OpenBSD computer inside of a Faraday cage on the bottom of the Mariana Trench. A specially trained team of elite dolphins uses the IP Over Dolphin (IPOD) protocol to take it to a trusted team on land, who then post it to this message board through seven proxies after bouncing it off a ping wall to avoid being traced by people using a GUI in Visual Basic. After that, I shut down the computer and move into my panic room until the dolphins return with any replies doubly encrypted.
Does your security system incorperate extraterrestrial sharks and dolphins so that their minds can't be read by people as easy? And do these look alike dolphins and sharks have rockets or other mechanical devices secretly surgically implanted into their bodies to speed up communication?jhae2.718 said:That would be what the team of sharks is for. Also, the messages are encryped using quantum waveform permutation encryption algorithms, which are unbreakable as long as [itex]P \neq NP[/itex], so I choose [itex]P\ne 0[/itex] and [itex]N \ne 1[/itex] to be safe.
The secret location is actually a submarine lair that can move around the bottom of the ocean at .99c.
Privacy and security are crucial elements in our daily lives. They protect our personal information, prevent identity theft, and ensure our safety both online and in the physical world.
Question 2:Some people may overdo privacy and security because they have experienced a security breach or identity theft in the past, or they may have a high level of concern for their personal information and safety. Additionally, with the increasing use of technology and social media, people may feel the need to take extra precautions to protect their privacy.
Question 3:Some common ways people overdo privacy and security include using multiple complex passwords, avoiding social media or using it with strict privacy settings, and being cautious about sharing personal information online or in person.
Question 4:While having strong privacy and security measures can be beneficial, overdoing it can also have negative consequences. For example, using overly complex passwords can make it difficult to remember them, and avoiding social media altogether can limit one's ability to connect with others and share information.
Question 5:To find the right balance between privacy and security, it is important to assess your personal level of risk and determine what measures are necessary to protect yourself. It is also helpful to stay informed about the latest security threats and regularly review and update your privacy settings and security measures. Additionally, using a password manager and being cautious about sharing personal information can also help maintain a healthy balance between privacy and security.