function drawWorld() {
var hash = '#|' + gridString() + '|[score:' + currentScore() + ']';
if (urlRevealed) {
// Use the original game representation on the on-DOM view, as there are no
// escaping issues there.
$('#url').textContent = location.href.replace(/#.*$/, '') + hash;
}
// Modern browsers escape whitespace characters on the address bar URL for
// security reasons. In case this browser does that, replace the empty Braille
// character with a non-whitespace (and hopefully non-intrusive) symbol.
if (whitespaceReplacementChar) {
hash = hash.replace(/\u2800/g, whitespaceReplacementChar);
}
history.replaceState(null, null, hash);
// Some browsers have a rate limit on history.replaceState() calls, resulting
// in the URL not updating at all for a couple of seconds. In those cases,
// location.hash is updated directly, which is unfortunate, as it causes a new
// navigation entry to be created each time, effectively hijacking the user's
// back button.
if (decodeURIComponent(location.hash) !== hash) {
console.warn(
'history.replaceState() throttling detected. Using location.hash fallback'
);
location.hash = hash;
}
}
please take a look at what they charge people who have to go through a whole visa process (for me, it starts at 179 USD to _apply_ (which may be rejected))
excluding all the time i'd have to spend and documents I'd have to collect
That's heavily dependent on regional/cultural factors. Among a younger and (mostly) gayer demographic, the once-feared "C-word" is very commonly used, especially in its adjective form.
hmm. I guessed something different (010001 maybe, I cant remember) and won first go too. I looked in the comments hoping to find the joke. I guess I'm 1 of the 10 people who don't understand binary jokes.
If you have a modern iPhone and don’t want the crazy hacks, a very very simple but effective tip is to power off your iPhone when exiting the aircraft. When the device powers up it is in “before first unlock” mode and is severely restricted in what it can do. The attack surface area is significantly reduced. They’re not going to burn one of their $100,000 per install exploits on your BFU phone the same way they do with a full physical access unlocked paid exploit.
> If you have a modern iPhone and don’t want the crazy hacks, a very very simple but effective tip is to power off your iPhone when exiting the aircraft. When the device powers up it is in “before first unlock” mode and is severely restricted in what it can do. The attack surface area is significantly reduced.
From a comment in the article:
"Schneier’s border crossing opsec advice is characteristically thorough, but the recommendation to simply ‘turn off your phone’ undersells modern forensic capabilities. As a security consultant who’s testified in border device seizure cases, I’ve seen CBP’s Cellebrite tools extract data from ‘off’ iPhones up to 72 hours post-shutdown via remnant charge in memory chips (see 2024 DEFCON demo). The article’s Faraday bag suggestion works, but only if activated before entering the 100-mile border zone – we’ve documented RFID sniffers in airport limo services."
I shut down my macbook before coming back to Canada and the agent threatened to confiscate it for a year. I unlocked it because it was purely a principle thing and a new laptop would've been expensive.
> A CBSA officer will start with some questions before examining your personal digital device. To examine the device, the officer will first ask for the password. If the device is password-protected, they will write your password on a piece of paper. You are obligated to provide your password when asked.
> Note Failure to grant access to your personal digital device may result in the detention of that device under section 101 of the Customs Act, or seizure of the device under subsection 140 (1) of the Immigration and Refugee Protection Act or under section 110 of the Customs Act.
Well guess we’re not going to Canada again.
It also never mentions them destroying the written down password.
> Electronic devices held for forensic examination under section 186 of the Customs Act will be retained for no longer than 14 days, provided there is no content on any device retained which renders the device subject to seizure under Customs-related laws. If any device is subject to seizure, the examination of any associated retained devices may take longer than 14 days.
It's a border crossing, required unlocking of devices is common practice including especially by the US. National sovereignty is supreme and countries have the right to implement whatever procedures they deem necessary before permitting entry.
Unlocking of devices is distinctly different than “write your password on a slip of paper”. Even if they shred the paper, the room for sure has CCTV video recordings so they’ll have a copy there as well.
Good thing all of us here are following (and extolling) the advice to never reuse passwords, espcially when ones device is in an evidence locker and subject to controlled access by authorized personnel
Persistence in modern macOS is only really possible in userspace, as the OS partition is immutable. There are only a handful of places this is possible, which are fairly easy to detect.
Unless border agents are burning 0-days on random passersby, it’s fairly unlikely they installed anything persistent that can’t be removed.
I’ve always been mildly curious about this. When you say “looked through my files” what exactly do you mean? They opened finder and scrolled through the standard folders like downloads, documents, pictures, etc?
They can still hold you for a long time (days?) at the border without being formally charged with anything. That's what I've been told, not sure how true it is. A Canadian entering the U.S was held for 2 weeks with no charges - not just a entry denial.
Same. The president is repeatedly threatening to annex my country. I was already avoiding the US because TSA is creepy, but now I'm actively divesting from it.
Same for me as well. I've also gone as far as moving any paying business away from the US. I have completely moved off paid US services as of about a month ago to Canadian or EU equivalents.
Yes and it was one of the best years of my life. I made more money from submitting vulnerability assessments than my day job. I’m structuring my life to do this again.
You get a little lonely as you don’t get the social fix from hanging out with work folk.
Overall the health benefits are immense. Both mental and physical as you have more time to look after yourself.
The success comes in the form of creating a void for opportunities to present themselves. I ended up doing things I never thought I’d do. Some were fun nothing burgers, and others were financially successful. The important thing is I got all my daily chores done first and only coded if I was “bored”. Coding/hacking came last.
LUTs are commonly used in geodesy applications on or near the Earth's surface. The full multipole model is used for orbital applications to account for the way that local lumpiness in Earth's mass distribution is smoothed out with increasing distance from the surface. It might be reasonable to build a 3D LUT for use at Starlink scale or higher, but certainly not for individual satellites.
reply