You totally are getting closeups of faces though in all of these games. In cutscenes, but still.
You totally are getting closeups of faces though in all of these games. In cutscenes, but still.
If you limit the resolution of the gayness measurement, sure. You could define least gay as 0 and most gay as 5, then you have millions of people on 5. But there are infinitely many real numbers, and if there were some theoretical 100% accurate way to measure “gayness” (whatever that means) at “infinite resolution”, the chance of two people being equally most gay is theoretically 0. On the other hand of the spectrum, it’d be impossible to be ENTIRELY not gay at all, so even if millions of people are very close to 0, one would be the closest.
I’m way overthinking this lol
You’re vastly overestimating how much the average consumer cares about these things
Skimmers are not a thing for Google Wallet / Apple Pay, no. Both these services use tokenization for transactions, meaning that even with your phone unlocked, no-one could grab anything via NFC that would allow triggering a transaction later, let alone clone your card. Even in this specific scenario described in the article (which requires your phone to be in the hands of the exploiter), the CVV of the card wasn’t exposed, so no-one can actually trigger a payment with this info except if they also have your physical card to read the CVV.
Google Wallet / Apple Pay are a million times safer than using your physical card, because the most common skimming attacks either just grab the magnet strip info if available or literally just read the info off the card optically including CVV, which allows for online transactions. None of these things are a concern with Google Wallet / Apple Pay.
But hey you know best right?
I worked as a TPM in financial services for almost 5 years, so yeah I think I’d know.
It was specifically stolen from Google Pay and contactless payments.
It wasn’t.
Did you read the article? Unless someone had physical access to your (unlocked) phone and was able to pin an app, then tap it against specialized hardware (unlikely you could get a normal card terminal to run this exploit), it’s extremely unlikely that this is how your details got stolen.
Oof, that quote is the exact brand of nerd bullshit that makes my blood boil. “Sure, it may be horribly designed, complicated, hard to understand, unnecessarily dangerous and / or extremely misleading, but you have nOT rEAd ThE dOCUmeNtATiON, therefore it’s your fault and I’m immune to your criticism”. Except this instance is even worse than that, because the documentation for that command sounds just as innocent as the command itself. But I guess obviously something called “tmpfiles” is responsible for your home folder, how couldn’t you know that?