He probably writes his tweets in a word processor and copies and pastes them into Twitter before sending the tweet.
This appears to be a confirmation code. I don't think it has to be for a bitcoin account. It could be for anything personal or government related. Perhaps they require him to reset his government passwords at a regular interval.
He's probably pasting what he thinks is the tweet he just wrote into Twitter and hitting send before realizing he pasted the confirmation code he copied and pasted earlier. It's most likely timed out and harmless by the time he sends it.
One group convinces themselves that it is impossible and never builds anything. Musk's group convinces themselves it is possible and never builds anything. At least the former is honest.
Yik Yak destroyed itself by ignoring their users and making changes that undermined the reason people used their app in the first place. They're only "struggling" because of a series of self-inflicted wounds.
That doesn't mean users wanted something else; I used it originally because it was a "localized 4chan". When they started adding usernames and whatnot, I uninstalled.
That was the thing users wanted, take it away and why use the app? There are hundreds of social communities I can join, so what is YikYak's MVP? From that perspective, you have to choose what battle you want to fight - maintain anonymity and deal with the ramifications or lose your userbase by becoming just another social app?
Cocaine seems more likely to me. Meth is certainly gaining some popularity (particularly on the west coast), but cocaine is most definitely the goto asshole-bro drug
It's like those services that popped up in the 90s that tried to translate things into the internet age. Like the service that would use your printer to print an entire newspaper for you ever morning.
It's a felony to access a computer system without authorization, access a computer system to obtain unauthorized computer services, degrade or disrupt a computer system, take data without authorization, or to use data obtained through misuse of a computer system.
The law is so vague everyone technically commits a felony every time they load a web page. Did ycombinator give you explicit permission to use this server? No, they did not. If they want you punished for posting this and they can find a friendly district attorney, you're screwed.
I'm old enough to remember when the conventional wisdom was that sharing music on the internet wasn't stealing because nobody was being deprived of physical media. Give Google a few years to lobby and create PSAs and people will being going to jail for creating ad blockers.
The law isn't nearly so cut and dry as that. After all, if something operates as a business, and also has a brick-and-mortar storefront, then it is also liable to accessibility guidelines per the ADA (see the lawsuit against Target a few years back).
As such, publicly accessible websites are, in effect, no less common areas than storefronts.
Of course, there's a way around this; websites could establish 'membership requirements' such as using a browser that does not have an ad blocker enabled; the content for most of the website would require being a member and volunteering to abide by membership rules to access. Violate those rules, and you would risk losing your membership and access to the content, though I seriously doubt grounds could be established for a lawsuit over it.
> Did ycombinator give you explicit permission to use this server? No, they did not. If they want you punished for posting this and they can find a friendly district attorney, you're screwed.
Did your local supermarket give you explicit permission to walk on to their premises to go shopping? No - they gave you implied licence to enter their premises which is made obvious by the circumstances.
Similarly, a court would almost certainly find that having a web server which is obviously intended to be publicly accessible would result in an implied licence for use of copyrighted material on the site for typical, expected usage of said site.
> The functions listed above are not mainstream use cases for legitimate software.
Who decides what is "legitimate" software? Do you want to live in a world where you have to get the government's approval before writing code?
How could a feature be "mainstream" if it isn't included in software? Should we have arrested Steve Jobs for the Macintosh because GUI wasn't "mainstream" when it came out?
For that matter... if it's not legitimate, then why does the hardware have the ability to do it? Why does camera hardware allow the light to be disabled during recording? I mean SYN is useful, and SYN flood might be useful for systems testing... that said, there are other tools for that, and RAT probably isn't the right place.
In any case, this is definitely a slippery slope as there are "Security" companies that provide software that does all of this that act as US, local and other govt vendors.
I thought it was obvious. We're still living in a housing bubble and the people who would otherwise live in buildings such as these are in homes they're struggling to pay for. There's no market for them until the inevitable correction.
This appears to be a confirmation code. I don't think it has to be for a bitcoin account. It could be for anything personal or government related. Perhaps they require him to reset his government passwords at a regular interval.
He's probably pasting what he thinks is the tweet he just wrote into Twitter and hitting send before realizing he pasted the confirmation code he copied and pasted earlier. It's most likely timed out and harmless by the time he sends it.