User Deleted@lemmy.dbzer0.com to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · edit-21 year agoDeletedmessage-squaremessage-square19fedilinkarrow-up123arrow-down12file-text
arrow-up121arrow-down1message-squareDeletedUser Deleted@lemmy.dbzer0.com to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · edit-21 year agomessage-square19fedilinkfile-text
minus-squareCorrodedCranium@lemmy.fmhy.mllinkfedilinkEnglisharrow-up10arrow-down1·2 years agoNot entirely, when there’s a will there’s a way. I posted here a while ago about Cuba’s weekly package system but snuffing out a sneakernet would be quite difficult. Another example would be the thousands of USB sticks that are smuggled into North Korea. Besides physically moving data there’s always new networks and methods that spring up.
Not entirely, when there’s a will there’s a way. I posted here a while ago about Cuba’s weekly package system but snuffing out a sneakernet would be quite difficult.
Another example would be the thousands of USB sticks that are smuggled into North Korea.
Besides physically moving data there’s always new networks and methods that spring up.