• CompassRed@discuss.tchncs.de
    link
    fedilink
    arrow-up
    1
    ·
    9 hours ago

    First, I can, but since you don’t want me to, I won’t. Second, it’s not a strawman, it’s your own analogy and it doesn’t work because it’s based on a false assumption. Using a found key to enter a house unauthorized is breaking in the same way that using a found password to enter an account unauthorized is hacking. The analogy works against your case, not for it.

    Now stop distracting from the administration in the divided states of middle northern america protecting child rapists including their head of state.

    This is the wildest accusation. I’m not the one deconstructing narratives around the emails to put my own spin on them. I’m the one using established terminology to properly understand the context of the story. You on the other hand, are claiming that Epstein’s emails weren’t hacked, which makes it conveniently easy to dismiss the story as spreading misinformation. I don’t believe this is your intention, but you should be honest, if anyone is distracting from anything here, it’s you. If that’s not what you are doing, then it’s not what I am doing either.

    It sounds like you know you are wrong and just want to score a cheap point against me. I didn’t say anything rude or mean to you and have given you absolutely no reason to accuse me of that. Just relax. We’re all friends here.

    • raspberriesareyummy@lemmy.world
      link
      fedilink
      arrow-up
      1
      arrow-down
      1
      ·
      8 hours ago

      No matter how many words you write, using a leaked password doesn’t make anyone a hacker. You clearly have no concept of hacking. Btw: there is no felony in German law related to unauthorized entry into a house on it’s own. All criminal relevance is gained from other intents.

      • CompassRed@discuss.tchncs.de
        link
        fedilink
        arrow-up
        1
        ·
        7 hours ago

        Repeating the same claim again and again doesn’t count as an argument. I do software engineering for a living. I have been paid for discovering security vulnerabilities. I know more about this than you do. I’ve been trying to explain it to you, but you won’t listen and choose to be rude instead.