Also known as snooggums on midwest.social and kbin.social.
If we believe 23 and me, they have only recieved 11 data requests for 15 accounts and provided zero data to law enforcement.
https://www.23andme.com/transparency-report/
That is a report on formal law enforcement requests for direct account information. Law enforcement is known to use genetic ancestry, so either they are using other sites or just running the tests themselves instead of doing a formal request.
I couldn’t find a case for suing companies, just defense requests to dismiss using the data in court but I might not be using the right search terms.
If the password is changed while the Planck Cruncher is doing its thing, and it changes to something that the PC has already guessed and tested negative, the PC is screwed.
Hint: Change your password regularly.
No.
In the real world having an actual high quality lengthty password is enough to deter anyone who is trying random accounts to move on for easier targets and anything that someone has physical access to, like law enforcement who confiscated something, will have an easier time bypassing the username and password process.
Changing passwords frequently leads to easier to break passwords, especially when you follow the practice of using a different one for different systems.
The fact that there was a shift in who dominates browser share from Netscape to Internet Explorer to Chrome suggests that the amount of complexity is going to encourage a market monopoly as long as someone breaks the standards in a way that gives them a small advantage. I don’t know if the alternatives would have a different outcome, as they may be simple now, but bloat may be inevitable.
What about the thing I said?