I’m a fella. What am I supposed to relate to? SpongeBob’s outline or Squidward’s crossed arms? Or…?
I’m a fella. What am I supposed to relate to? SpongeBob’s outline or Squidward’s crossed arms? Or…?
Turns out you don’t have to be running out of humans to value human life.
CGNAT sucks any time you want a reliable link to anyone else behind a NAT. Multiplayer games, p2p sharing, video calls all are less reliable.
We planned for that. We should be fine at least until we are an interstellar species. We could assign an IPV6 address to EVERY ATOM ON THE SURFACE OF THE EARTH, and still have enough addresses left to do another 100+ earths. It isn’t remotely likely that we’ll run out of IPV6 addresses at any time in the future.
Lota of differences but the key is: A ponzi scheme pays returns out of future investment. Fractional reserve lending pays returns from interest collected on investments.
Not literally. I bet the poster notices the overlap between ponzi and fractional reserve lending and doesn’t care about the differences
ircCloud because my self hosted push notifications were failing and it worked right away.
Irssi before I started depending on push notifications though.
What makes it more of a minefield than email?
First of all a properly seasoned cast iron pan can and should be washed with modern dishwashing liquid. If the seasoning comes off with 'hand friendly ’ soap it was garbage seasoning anyway.
Second, this looks perfectly ready for seasoning. Nothing wrong with that. Just get the outdoor grill going grab some short chain oil and get to work.
I agree. Premium modern plastic or resin beats metal or glass any day.
Better grip. Better duribiliy. Transparent to radio. Easier to repair or replace. It’s just better.
++ Totally. 10€ a month can’t be close to the value of the data. If the cost was actually based on the value of the data it might be a valid choice.
I’m still curious where coercion comes into it?
You choose to visit Facebook. They’ve always provided services funded by your data. Now you get to choose between that model or compensating them directly.
Where does the coercion come in?
PS, I hate Facebook and don’t use it in case that matters somehow.
Wait… you would get behind ruining Wikipedia just so you wouldn’t have to see fundraising banners when you use it?
Thanks for the civil discussion. While my views haven’t changed I have learned a lot about possible objections from informed people.
Let’s hope this new auth standard is implemented responsibly by all the major parties and that weak passwords and phishing become relics of the past.
But that’s the whole thing we are trying to solve here. We are trying to eliminate human factor and by extension bad habits people have when it comes to security. So expecting people to use good passwords and pins for keys will be the same as expecting people to have good passwords for accounts. Perhaps even worse because of claims it’s better security so people might even relax more.
I feel like it’s 2001 and I’m trying to convince my users to switch from passwords to RSA keys for SSH. Yes there are potential weaknesses. Yes it’s still much better.
Also timeouts with pins and passwords mean very little once someone has your device. This is why I don’t consider it good two-factor. PIN might be in your head, but nothing is preventing someone brute forcing it. Once you image the device you can do whatever you want. With credit cards, you’d need ATM to keep doing it and lockout is a serious problem there.
Even if all we’ve done is reduced potential attackers from everyone with an Internet connection to people with physical access to the device we’ve still massively increased the average user’s security. And we’ve done more than that.
Also unless you can clone the device somehow hitting max guesses and losing access just like an ATM is part of the design.
It’s a step in right direction for sure, but I’d prefer if keys didn’t depend on PIN or password.
I lost track of your suggestion over the weekend but what was your suggestion for second factor other than a pin or password?
Kinda. Given that nobody else supported it Google dropping it did sort of kill it. Passkeys are very different as they are already supported by Apple, Microsoft, and scads of smaller companies.
True. In the context of this thread it doesn’t matter though.
You link to articles about law enforcement hacking phones to get data as a reason not to use biometrics? If they are hacking your device it doesn’t matter if you use a password or a fingerprint.
What is? Are you claiming the open source code base has a timer grabbing binaries from a Google server and executing them?