Why do you think SSH-Keys are safe against phishing?
I mean it is unlikely, that someone will just send the key per mail or upload it somewhere since most ppl using SSH-Keys are more knowledgeable.
When you now get an easy one click solution to transfer Passkeys from one Cloud provider to another it will get easier to trick a user to do that.
Scenario: You get a mail from Microsoft that there is a thread and that you need to transfer your keys to their cloud.
No, that would make no sense and is obviously not what i meant.
But you could separate the arr stack from things like pihole with a vm. For example you could pin one thread to that VM so you will not bottleneck your DNS when you are doing heavy loads on the rest of the system. This is just one example what can be done.
Just because you do not see a benefit, does not mean there is none.
Also, VMs are not "heavy" thanks to virtualization technology built into modern hardware, VMs are quite light on the system. Yes they still have overhead but its not like you are giving up big percentages of your potential performance, depending on the setup.
I use a consumer SSD for caching on ZFS now for over 2 years and do not have any issues with it. I have a 54 TB pool with tons of reads and writes and no issue with it.
Yes, there is countless examples of root CAs containing compromised CAs.
This incidence with digicert is not about a compromised CA it is about a flaw in their validation system. That is not what you claimed. Such flaws happen from time to time, lets encrypt had an issue a while back too.
So one of the ones complaining, complained that they should rather implement the feature he needed instead of posting a tweet that took 20 seconds to write?
Not exactly. They are pointing out that HTTPS assumes all is well if it sees a certificate from any "trusted" certificate authority. Browsers typically trust dozens of CAs (nearly 80 for Firefox) from jurisdictions all over the world. Anyone with sufficient access to any of them can forge a certificate.
Great thing, that you can remove them and only trust those you trust.
Also, HTTPS doesn't cover all traffic like a properly configured VPN does.
Pls explain what https is not covered? The SNI on tbe first visit? A VPN just moves the "exit point" of your traffic. Now the Datacentef and VPN provider sees what you ISP saw.
it's not difficult for a well positioned snooper (like an internet provider that has to answer to government) to follow your traffic on the net and deduce what you're doing.
No. I never said otherwise. But they cannot spy on the traffic. And since the SNI is not encrypted anyway they do not even nerd to "follow the traffic". But what sites you are visiting and what you are doing on them are 2 different things.
Best we have and probably will ever have on the current web. Not sure what the problem is with password managers?