Yes. Good. Tear your own party apart. Without the Republican menace to worry about, a new progressive party can arise to challenge the Democrats and yank the Overton window back where it belongs.
My point is that both on Windows, and on Linux systems that use the X11 window system instead of Wayland, any program can log your let presses with basically no effort.
On Wayland, they probably still can. Wayland's core protocol doesn't allow it, but extensions to enable things like global hotkeys can almost certainly be used for shenanigans.
Also, if the keylogger is running under your user account, it can insert crafted .desktop files wrapping around your apps, ptrace your apps, you name it. Sandboxing as in Flatpak can stop this sort of thing, but if you run an app outside such a sandbox, and it's malicious, game over.
Sure, but if he's ineligible, then all that does is split the Republican vote and hand the election to the Democrats on a silver platter. Crisis averted.
This comic was ahead of its time. Back when it was written, optical disc drives were still common, so an external drive would be E: or higher. Now, though, it's actually realistic.
How will I notice when the spare fails, if it's only a spare and I don't regularly use it? Then I'm down to only one key, and as any grumpy backup admin will tell you, if you have only one copy of something, you have zero copies.
I would have a key plugged into the computer pretty much all the time when I'm working, so anyone who compromises the computer can impersonate me as long as I'm at work. This would be mildly inconvenient to the attacker, but wouldn't actually stop the attacker. And if the computer isn't compromised, how is anyone going to get into my GitHub account even without 2FA? They certainly aren't going to do it by guessing my 16-character generated password or Ed25519 SSH key.
Something-I-know is worthless for authentication in the age of GPU password cracking. Most humans, including myself, do not have photographic memories with which to memorize cryptographically secure passwords. We're all using password managers for a reason, and a password database is something you have, not something you know.
Niche energy production methods don't benefit from economies of scale, and may be cost-ineffective.
“Drill, baby, drill” thinking led us to this point with fossil fuels; it can be similarly disastrous with biomass. The availability of profitable biomass energy will likely tempt the rich to overuse it, resulting in an artificial global famine.
I can do that with alphanumeric codes, yeah, but can I get alphanumeric codes from GitHub, or is it going to be a QR code? I can't write down a QR code…
F