Jump to content

robot_hell

Members
  • Content Count

    1,348
  • Joined

  • Last visited

  • Days Won

    1
  • Feedback

    0%

Posts posted by robot_hell


  1. I'd be fine with what you normally suggest people looking to start with.

     

    1. "Tactical Response" Basic fighting pistol class certificate required

    2. Draw from a strong side Serpa without shooting yourself in the leg 5x

    3. Draw from a holster and chamber a round with the slingshot method (since carrying chambered is dangerous)" and hit a headshot at 25 yards Israeli style

     

    How do I slingshot a revolver? Or do I just leave the chamber under the hammer empty? Nobody needs more than 4 shots, right? :)


  2. I really don't see why they couldn't implement a hardwire technique. Physically removing the memory from the phone or something similar like jumping connections. No remote access means they would need the physical phone and have to take it apart.

     

    I agree with Apples sentiments on the issue, but I also think there should be a way to access information without providing a backdoor for anyone to take advantage of.

    For there to be a hardware-based bypass to encryption, at some point in the system there would need to be software logic that effectively checks if the bypass is present. That logic is what would be attacked remotely, not the encrypted data or even the keys themselves.


  3. You could also keep a pile of money or a wedding ring you saw laying around in the corner of a church.

     

    It's nice to try to get people their stuff back.

    It's always nice to do that when it's unlikely to get you thrown in jail, like when you report finding a wedding ring.

     

    If you were to find this stolen AR ditched on the side of the road in CA and call it in, there's a non-zero chance you would be arrested on suspicion of being the thief or for simple possession of a prohibited firearm, because there's little proof you didn't put it there. That alone makes the risk greater than the warm fuzzy reward I would get from getting the stolen property back to its owner.

     

    If I saw it, I'd leave it, shake my head "tsk", move on with my life.

     

    Now most other states, and it's a different story...


  4. I don't think my idea restricted it. Just gave a Tax benefit if you did

     

     

    Sent from my iPhone using Tapatalk

    Ah yes, just like the old chestnut, "it's not a credit card surcharge, it's a cash discount"

     

    Come on, now. Wouldn't you call a tax benefit given to people who don't own a gun the same exact thing as a tax penalty for gunowners?


  5. What are we talking about? Kabooms? Can and will happen with any brand of pistol... Lemons happen. Sometimes it's operator error. That kB'd Glock? Could have been a stress fracture from the factory, or it could have ben 18 grains of WW231. Exploded Colt... could have been poor heat treating, or a 180 gr bullet seated flush in a .38 case. A lot easier to folks blame the manufacturer than it is to admit a user screw-up.


  6. Yes, it effectively eliminates skimming but doesn't eliminate fraud. My point is that if the system is compromised, its impact will be much greater when compared to the localized skimming attacks to which we are vulnerable now. It moves authentication farther up the chain, which centralizes and enlarges the attack point-- still a trade-off.


  7. What ataimwolswol said. All the same size except the officers is smaller.

     

    Must take into account things like a single sided or ambi thumb safety and whether you want the bottom of the grip radiused or not. Also, if you have a bobtail then its a differrent cut at the back to fit that frame mod.

     

    This ^

     

    One thing to add; there is also a slim grip that does not support the plunger tube. Most people would probably recommend you keep that support, but it's up to you. Aside from that, the grip screw holes should reliably line up.

×
×
  • Create New...