Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)AO
Posts
0
Comments
1,229
Joined
2 yr. ago

  • … the founding ideas are promising, and something I dream of.

    Hard disagree. The founding idea of cryptocurrency is to trick people out of their real currency. It's an elaborate fake-money scheme. Good riddance.

  • My point is that both on Windows, and on Linux systems that use the X11 window system instead of Wayland, any program can log your let presses with basically no effort.

    On Wayland, they probably still can. Wayland's core protocol doesn't allow it, but extensions to enable things like global hotkeys can almost certainly be used for shenanigans.

    Also, if the keylogger is running under your user account, it can insert crafted .desktop files wrapping around your apps, ptrace your apps, you name it. Sandboxing as in Flatpak can stop this sort of thing, but if you run an app outside such a sandbox, and it's malicious, game over.

  • The D

    Jump
  • This comic was ahead of its time. Back when it was written, optical disc drives were still common, so an external drive would be E: or higher. Now, though, it's actually realistic.

  • How will I notice when the spare fails, if it's only a spare and I don't regularly use it? Then I'm down to only one key, and as any grumpy backup admin will tell you, if you have only one copy of something, you have zero copies.

    I would have a key plugged into the computer pretty much all the time when I'm working, so anyone who compromises the computer can impersonate me as long as I'm at work. This would be mildly inconvenient to the attacker, but wouldn't actually stop the attacker. And if the computer isn't compromised, how is anyone going to get into my GitHub account even without 2FA? They certainly aren't going to do it by guessing my 16-character generated password or Ed25519 SSH key.

    Something-I-know is worthless for authentication in the age of GPU password cracking. Most humans, including myself, do not have photographic memories with which to memorize cryptographically secure passwords. We're all using password managers for a reason, and a password database is something you have, not something you know.

  • Two problems with that:

    1. Niche energy production methods don't benefit from economies of scale, and may be cost-ineffective.
    2. “Drill, baby, drill” thinking led us to this point with fossil fuels; it can be similarly disastrous with biomass. The availability of profitable biomass energy will likely tempt the rich to overuse it, resulting in an artificial global famine.