There are two types of data transfers, posted and non-posted.
Non-Posted are like data sent to your screen, it's a constant stream and there is no receipt of data packet sent in return. Your video card doesn't care if your monitor is there, or not. The video card just sends a stream of data, and it either gets to its destination, or it doesn't.
Posted data streams are a bit more complex, these DEMAND a response and acknowledgement or error routines are created. This would be like a financial transaction, if the bank doesn't respond EXACTLY, with the correct encrypted code, within a fraction of a second, error routines are called into play.
Or, on a PC, your machine may hang - requiring you to yank the cord. That's because something, somewhere is waiting for a Posted Protocol, that either returned an error, or failed to return - so your machine waits - forever.
So, if you were dumping 31 TB to blow up and avenge your death - what would you do? The data has been "out there" for years, encrypted and tied together with a huge key (which he released), now people are simply using the code that he dropped - to unlock the data.
There are two types of data transfers, posted and non-posted.
Non-Posted are like data sent to your screen, it's a constant stream and there is no receipt of data packet sent in return. Your video card doesn't care if your monitor is there, or not. The video card just sends a stream of data, and it either gets to its destination, or it doesn't.
Posted data streams are a bit more complex, these DEMAND a response and acknowledgement or error routines are created. This would be like a financial transaction, if the bank doesn't respond EXACTLY, with the correct encrypted code, within a fraction of a second, error routines are called into play.
Or, on a PC, your machine may hang - requiring you to yank the cord. That's because something, somewhere is waiting for a Posted Protocol, that either returned an error, or failed to return - so your machine waits - forever.
So, if you were dumping 31 TB to blow up and avenge your death - what would you do? The data has been "out there" for years, encrypted and tied together with a huge key (which he released), now people are simply using the code that he dropped - to unlock the data.
Kek