Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)LO
Posts
40
Comments
962
Joined
2 yr. ago

  • I have a liquid repellent but it doesn't work well. Feels like 1) by the time the mosquitos are in its range they're already inside and can't figure out how to go back out so they hide in other rooms 2) some mosquitos don't care at all and keep harassing either way

  • There weren't so many around when I lived just a couple kilometers away and I dont live near water neither.

    Also 100 - 300 sounds terrifying, glad their numbers are more or less stable through summer

  • The eff passphrase generator has about 2.5 bits of entropy per character (without word separators). Eff recommends 6 word passphrases, and with an avg word length of 7, that's (only) 79.45 bits of entropy that won't even fit in the 32 characters. If there wasn't a password length limit it would be possible to saturate the hash entropy with a 20+ word & 102+ char passphrase.

  • What scenario are you talking about?? From the article:

    NGate malware can relay NFC data from a victim’s card through a compromised device to an attacker’s smartphone, which is then able to emulate the card and withdraw money from an ATM.
    ...
    Masquerading as a legitimate app for a target’s bank, NGate prompts the user to enter the banking client ID, date of birth, and the PIN code corresponding to the card. The app goes on to ask the user to turn on NFC and to scan the card.

    Physical card is involved, mobile payments isn't.

  • There is nothing being subverted, nfc has applications other than contactless payments that require it acting as the reader, which is why it's supported. It would be better if it was behind an explicit permission (just like other sensors would) but limiting it to only responding to readers is like limiting Bluetooth to audio transmission.

  • The fact you can trick the NFC system on the phone into reacting to "phantom" payment events and intercept the resulting token sounds like a pretty big problem.

    That's not what's happening though? It's relaying a physical card's nfc not tricking mobile contactless payments