WYGIWYG

  • 1 Post
  • 1.05K Comments
Joined 1 year ago
cake
Cake day: September 24th, 2024

help-circle

  • rumba@lemmy.ziptoProgrammer Humor@programming.devGitHub auth
    link
    fedilink
    English
    arrow-up
    1
    ·
    17 hours ago

    Everybody does it differently. GitHub in particular allows multiple

    If you are doing development or admin work, I would greatly advise you to pick up a Yubi Key.

    My basic setup for any app/site that will allow it is two yubis and one passkey.

    One yubi in the safe with next of kin instructions, one on my key ring.

    Then any site that supports passkey, I’ll also have one of those there too.




  • rumba@lemmy.ziptoProgrammer Humor@programming.devGitHub auth
    link
    fedilink
    English
    arrow-up
    3
    ·
    20 hours ago

    You can read the cables, you can read the transceivers in the video card, in a lot of the screens you can even read the panel changing itself.

    Our ability is to remote sense EMF is absolutely ridiculous these days.

    Then there’s crap like the espionage where they change fan speeds. Or flash an infrared proximity sensor on a cell phone to exfiltrate data.


  • rumba@lemmy.ziptoProgrammer Humor@programming.devGitHub auth
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    20 hours ago

    Those are awfully dangerous on their own these days.

    As soon as a poorly salted hash leaks or gasp, a hash with no salt, it’s super easy to reverse those passwords now.

    2FA severely reduces the danger of rainbow tables and keyloggers. The only real worry with 2FA is login replacement and interception. and passkey solves that, allbeit at the cost of complexity.




    1. password + 2FA AND/OR passkey required.
    • baby steps, start with getting them secure, then when most are ready start dropping the password
    • iron out the kinks, give all apps a chance to implement
    • if you only ever login with passkey and it asks you for 2fa, you can scrutinize the page more

    You can tell just from the response on this post people aren’t all ready for passkey yet, but you can’t wait fo them to decide they’re ready before you start.


  • Under passkey implementations, you need to unlock the passkey device with biometrics or passwords. Something you are/know (biometrics/passwords) and something you have (passkey).

    It’s not impossible to screw it up. Put your passkeys in bitwarden, reuse a password and don’t 2fa that.




  • but they require chmod 400 and they’re ideally in on an encrypted disk

    So the desk drawer is locked and the codes are Luks encrypted.

    And for critical stuff, you should also have a password on the key.

    If your ssh keys are like a passwords on paper in a drawer, you’re doing it wrong.




  • Did a little digging around. It looks like they manage to get discovery judgments all the time over partial downloads, but I don’t see them actually taking anyone to court for anything less than a full file.

    Once you have the entire file available, it’s hard to shimmy around the distribution claims. Wouldn’t it be super effing interesting if everyone’s torrent client specifically picked a random block and refused to give it to anyone?

    I’m not sure it would hold up in court, but it would be interesting.