Then change the title of the post to something open-ended like "How vulnerable is Lemmy to DDOS attacks?". Taking out a major node which hosts many key communities is going to have an adverse impact.
The TOTP feature in Bitwarden works, if you paste in the whole otpauth:// URI to Bitwarden's Authenticator Key (TOTP) field. The URL specifies that the hashing algorithm should be SHA256. If you just import the secret= value into Authy, it probably defaults to using the SHA-1 algorithm, which may be why the codes generated by Authy don't work.
SHA256 is more secure than SHA-1, which I guess is why Lemmy has chosen to use it for its 2FA feature.
When I compiled that program, the executable was around 10MB. I wrote the same program in C, and the executable was 15kB. That's about 3 orders of magnitude difference. Is Rust really 1000 times better than C? :-)
Very good. I think a feature where a user can revoke all their cookie sessions is still worthwhile, and maybe I'll look at raising a feature request for that, but it is good to know that cookies stolen during the recent hack have already been addressed.
It seems there is no way in Lemmy to invalidate all your session cookies? Without that, how can you secure an account which has a stolen session cookie?
Then change the title of the post to something open-ended like "How vulnerable is Lemmy to DDOS attacks?". Taking out a major node which hosts many key communities is going to have an adverse impact.