Skip Navigation

Posts
37
Comments
402
Joined
2 yr. ago

  • Some key quotes from the article:

    It’s perfectly reasonable for a consumer cloud storage provider to design a system that emphasizes recoverability over security. Apple’s customers are far more likely to lose their password/iPhone than they are to be the subject of a National Security Letter or data breach (hopefully, anyway).

    I wish that companies like Apple could just come right out and warn their users: ‘We have access to all your data, we do bulk-encrypt it, but it’s still available to us and to law enforcement whenever necessary’.

    So what is the alternative?

    Well, for a consumer-focused system, maybe there really isn’t one. Ultimately people back up their data because they’re afraid of losing their devices, which cuts against the idea of storing encryption keys inside of devices.

    You could take the PGP approach and back up your decryption keys to some other location (your PC, for example, or a USB stick). But this hasn’t proven extremely popular with the general public, because it’s awkward — and sometimes insecure.

    Alternatively, you could use a password to derive the encryption/decryption keys. This approach works fine if your users pick decent passwords (although they mostly won’t), and if they promise not to forget them. But of course, the convenience of Apple’s “iForgot” service indicates that Apple isn’t banking on users remembering their passwords. So that’s probably out too.

  • This is a consistent problem for me

  • What self-hosted services did you set up passkeys on? How did setting it up go?

  • Is there a passkey setup that's easy to self host? I think passkeys with a backup would be best.

  • I'm going to give this a try. Thanks for working on it!

  • Scrum lends itself to procedural nonsense. It's rarely implemented in a way that improves project management.

  • If all you care about is speed you could do even better than EXT4. But I wouldn't recommend it because you should care about more than speed.

  • I love that bcachefs is getting so close to being a realistic option.

  • I'm expecting that everything that the statistical models reveal or make convincing results about which benefit the owners of the models will be exploited. Anything that threatens power or the model owners will be largely ignored and dismissed.

  • The few laws that govern this type of activity will be strictly adhered to, right?

  • You should be aware that this is classified and marketed as a microcontroller, so it's just a bootloader to some code with no OS or a RTOS.

    Something like the RPi Zero is a SBC that's relatively close in size.

  • It’s not legally binding when the person at AMD didn’t have the authority to do so.

    This is not how the law works in the US. It's very dependent on extenuating circumstances.

  • A compliment sandwich would be the best implimentation.

  • The two rooms linked above are mirrored, so you can use either XMPP or Matrix, from any client you prefer, on pretty much any platform under the sun!

    There's no XMPP link in the README above the quoted statement.

  • Awesome! Best of luck to the new team!

  • My interpretation:

    It means unstable (expect the beta version to be different than the alpha version in possibly fundamental and significant ways), and possibly buggy (let them know what problems you run into). If you're okay with that, have at it!