• 0 Posts
  • 136 Comments
Joined 1 year ago
cake
Cake day: August 19th, 2023

help-circle




  • Adobe used to house all the licensing mechanisms in a single file named amtlib.dll. The people who cracked it just nulled out the function. And since it was the same for every piece of software, just repeat the null process for each one. Bam, the entire suite for free.

    When Adobe switched from CS to CC subscription, it was cracked in 24 hours. Largely because they didn’t change much.

    Adobe then axed the crippling DLL file and baked the mechanism right into the executable. A patcher tool was released that could crack each one. The upside is you could install and keep them updated from the CC Desktop and just run the patcher each time. Sometimes you had to wait for an update to the patcher. So before you clicked “update” you had to double check to make sure it worked.

    To stop the free trial abuse (which is how people installed anyway) Adobe started requiring billing information during setup before you even get to downloads.

    Later on, Adobe prevented users from updating apps if there wasn’t an active subscription.

    The patcher eventually stopped working because it was abandoned (this around 2019 when I gave up using it because Resolve and Affinity were more affordable and met my needs.) Months later someone else picked up the patcher development. There’s also pre-cracked versions you can download and install.

    I’ve not touched Adobe since and find Resolve to be significantly more stable and at $300, much more affordable. The Affinity Photo and Designer apps are great and affordable too at $170 for the bundle.



  • Someone made a mistake here. It’s not getting your IP address. An IP address is assigned by the gateway when you’re connected to an access point. An IP address is not an identity. They are always changing and can be shared. This has already been tested and upheld in court.

    It’s actually collecting your MAC address. Which is exchanged when your phone or tablet scan nearby WiFi points or Bluetooth devices. However, this can already be defeated. By default iOS and Android both have the option to randomise the MAC address in intervals. Making it extremely difficult to prove anything. This feature exists because the devices real MAC address never changes. It is unique. Alternatively, users can disable WiFi and Bluetooth scanning entirely. However, your device no longer participates in the Find My Devices program by Apple and Google, location does take longer to acquire in some scenarios, and accuracy may take longer to triangulate.










  • No, they can still refuse to provide a device as my original comment states. Since my employer refused to do so, they came up with an alternative without any additional input from me. They completely side stepped the app requirement by using a little key chain once they reached out to Cisco. Your employer has options. They have to find out what works best to make sure you can do the job they have hired you to do.


  • It doesn’t matter if it’s apps that use data or apps that don’t use data. If your employer requires you to install an app on your personal phone, you can refuse. It is your legal right. If you choose to exercise your legal rights, your employer must provide you with an alternative method that doesn’t involve your personal phone. Whatever they choose.

    If you agree to installing a work related app on your personal phone, you must be compensated. If they refuse to compensate, you’re back to square one. They must provide you alternatives.

    If your employer refuses to supply you with the tools to complete your job and/or refuse to compensate personal phone use for work related reasons, they are breaking the law. If they fire you for exercising your rights, it’s unlawful termination.


    Here’s an example: My employer started requiring 2FA for the computer logins. They wanted me to install an app by Cisco. I said no. You can provide a locked down phone that can be used for the sole purpose of 2FA. They declined as that isn’t in their budget and “unnecessary”. They later came back with a little keychain that’s bound to my account. I press a button on the keychain and get the 2FA code. I can do my job and they did their job and gave me the tools to do so.



  • No matter what app it is, if employers require one to be used on a smartphone, they are legally obligated to provide you with a work phone. If they refuse, they are legally obligated to provide reimbursement for your personal mobile plan. This can be as simple as $5 or $10 added monthly to a paycheck, or as detailed as actual usage down to the kilobyte.

    Even if it’s as simple as clocking in and out. If they won’t provide a phone or reimburse, they must have some other method to complete the task. Whether it be a computer or paper. Failing that, they are not upholding the law of providing you tools necessary to complete your job. Which means if they terminate you for any of the above under “not able to do your job”, it is retaliation for you requiring them to do their job. You could potentially win a suit against them.


  • From their own privacy policy they outline what they do:

    For research and development purposes, we may use datasets such as those that contain images, voices or other data that could be associated with an identifiable person.

    To provide location-based services on Apple products, Apple and our partners and licensees, such as maps data providers, may collect, use, and share precise location data, including the real-time geographic location of your Apple computer or device.

    Apple’s websites, online services, interactive applications, email messages, and advertisements may use “cookies” and other technologies such as pixel tags and web beacons.

    We also use personal information to help us create, develop, operate, deliver, and improve our products, services, content and advertising

    At times Apple may provide third parties with certain personal information to provide or improve our products and services, including to deliver products at your request, or to help Apple market to consumers.

    Apple may collect location, IP Address, network information, Bluetooth information, connected devices, accessories, personal demographics, browsing history, browser fingerprint, device fingerprint, search history, app data, usage data, performance, diagnostics, product interaction, transaction information, payment information, purchasing records, contacts, social graph, watch history, listening interests, reading list, call metadata, device information, messaging metadata, email addresses, salary, income, assets, health data, ad interaction, in-app purchases, in-app subscriptions, app downloads, music downloads, movie downloads, TV show downloads, Apple ID, IDFA, Random Unique ID, UUID, IMEI, Hardware serial number, SIM serial number, phone number, telemetry, cookies, Nearby WiFi MAC, Siri request history, Web sign-in, songs played, play and pause times, playlists, engagement and library.

    Literally all of this is what Google does. The only thing Apple does differently is hinder 3rd party apps to a greater degree, whereas Google is more permissive. But to be fair, Google has been improving the Privacy features of Android with each version.

    https://tosdr.org/en/service/158