Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)GE
Posts
0
Comments
792
Joined
2 yr. ago

  • then i found you can't export your data from Authy

    Exporting data from a 2FA app sounds like the opposite of secure. Not to mention you don't want your 2FA codes on Authy (or any other 2FA app) to remain valid if you're not using it.

    When I switched from Google Authenticator to Authy years ago, I went through each 2FA-enabled account one by one to disable 2FA and then re-enable it using Authy. It's a long process depending on how many accounts you have 2FA enabled on, but it's worth it.

    Reading the OP, looks like it's time to generate new keys for all my 2FA accounts.

  • Once you have mint growing in your garden/yard

    you will never not have mint growing in your garden/yard/neighbors yard.

    I love how the mint just spreads from your yard to your neighbor's yard.

  • deleted by creator

    Jump
  • The way I read it, they already (in the third paragraph of the blog post) had companies auditing their backend technology and (in the fourth paragraph) were starting to have companies audit their apps, too.

  • deleted by creator

    Jump
  • I admittedly should've done more research before my first comment, but it does actually turn out that everything I said is true. Proton's technology was previously audited by Mozilla and is currently audited by SEC Consult and other companies regularly, and the audits are available for everyone to view. Additionally, they do have a bug bounty program. Also (and this is something I didn't mention), the ProtonVPN and Proton Mail apps are all open source.

  • deleted by creator

    Jump
  • That's where the second and third paragraphs come in. Because other companies likely test it themselves, too.

    They'll typically report security bugs privately and then, after X amount of months, publicly announce the bug. Doing it this way will, ideally, force the other company to patch the bug prior to the announcement. If not, they'll end up with a publicly known security bug that bad actors can now exploit. The announcement will also let the public (including companies) know to update their software.

  • deleted by creator

    Jump
  • I imagine it probably is inspected, just not by the public. They probably do it themselves.

    And they may have contracts with certain companies specializing in this sort of security that also inspect it.

    And there's also the cybersecurity companies that test it whether they're contracted or not. At some companies, their entire job revolves around finding bugs (especially security bugs) in other companies' software.

    Just because it's not on GitHub doesn't mean it's not a good product that hasn't been thoroughly tested.

  • People can usually unlock the carrier on their own. Many phones (or at least every phone I've ever gotten from T-Mobile) even come pre-installed with a carrier unlocking app. It's just not automatic, and certain conditions need to be met.

    People may also sometimes be able to buy phones already unlocked directly from the manufacturer if they want to. (Whether or not they're able to do this depends on the manufacturer.)

  • I'm just not ready...

    I'm almost the same way. I'm not really feeling negative about it, though. I just feel nothing towards it, which is almost worse. Like you said, though... maybe some day. The interest is still there somewhat, just not nearly enough for me to act on it.

  • I watched 7, suffered through 8 and didn't even care about watching 9.

    I almost didn't watch 9. Then a friend of mine who'd walked out of the theater while watching 8 told me 9 was actually good. So I took his word for it. Episode 9 was okay. Not good or bad. Felt like they were trying to cram two movies into one. But, without getting into spoilers, compared to 8, 9 was still okay.