This profile is from a federated server and may be incomplete. Browse more on the original instance.

azron,

My understanding is:

Passkeys are like a password + 2FA mashed together. If someone steals your “passkey password” they still can’t use it to login without the hardware component. That means phishing is harder. Since passkeys are generated for the user from their hardware it also forces better hygiene on the user by not allowig any password duplication.

A downside is it is tied to hardware and a provider that can cause problems witb loss of device or when you change devices but it is hard to say how painful that is going to be.

[edited for a bit more clarity]

azron,

Wow. Are you serious? Seems like not a great exam…

azron,

-What does this have to do with OP saying part of the exam had him reciting a manpage effectively?

Edit: I see so they shouldn’t be that way anymore since OP was doing RHEL 5 exams

azron,

Other than declutter and conformity (which are good goals in general) what else are you getting here? What would you be able to do tomorrow if they suddenly supported XDG_CONFIG that the general population would benefit from?

azron,

The fight is how you learn :). Good job persevering.

azron,

This is only as true as how willing people are to try to shove malware places. When you listen to music or play a video there is software that can be taken advantage of to run unexpected code. The risk is definitely lower but it is still there. If a site is burned by their own reputation I’d go elsewhere to get everything and anything.

azron,

So like 8% of the market, mostly from Mozilla?

azron,

DCC = direct client-to-client. With IRC the server is not hosting or distributing any files it is making connections between clients similar to edonkey or soulseek just with a different protocol. Which means you connect directly with your IP to the client that has the files you want and the bandwidth is dependent on how fast each of the clients’ internet is.

azron,

You mean the one in fpsdoc.com where it says:

Digital Release: 31st August 2023

Estimated Shipping: 30th Sept. 2023

I understand things get leaked but it is rare nowadays and likely needs to be more popular than this will be.

azron,

Librewolf is starting to replace Firefox for me. Either way birds of a feather!

azron,

What are you using this for?

azron,

Port forwarding allows for a direct connection from one client to another. Effectively when a VPN let’s you port forward if you go to the external IP address they assign + the port they assigned they will be able to directly connect to a port that a program/service is listening on.

Torrent sites are only telling your client who to connect to via the tracker, your client still needs to be able to connect to them. You can still download without this but it is generally slower (may be going through a relay) and you cannot seed torrents except for anyone that can directly connect to you on whatever VPN you are on.

*Likely some mistakes above. Keep me honest denizens of the web.

azron,

So you have raw database access and you can see that data. Why is this surprising? The systems I’ve used that solve storing data encrypted have massive usibility hits around exchanging and authenticating services to a point where it sucks. I’m not saying this couldn’t be fixed but should it? Most services that uses a database will be inline with your discovery of how Lemmy uses that database. Storing something encrypted that is meant to be viewed publicly is the same outcome with more steps. If someone cares enough to monetize it just patch the code to change whatever behavior you don’t like. I havent seeing anything about an acceptance test for Lemmy instances or anything that requires someone to use an unaltered version of Lemmy. How do you know the server admin isn’t already doing all of this? You don’t. Don’t expect privacy in public spaces.

azron,

So you have raw database access and you can see that data. Why is this surprising? The systems I’ve used that solve storing data encrypted have massive usibility hits around exchanging and authenticating keys to a point where it sucks so bad I just want to disable it (matrix is a good example, non question their key exchange bullshit is hindering their adoption). I’m not saying this couldn’t be fixed but should it? Most services that use a database will be inline with your discovery of how Lemmy uses that database. Storing something encrypted that is meant to be viewed publicly is the same outcome with more steps. If someone cares enough to monetize it just patch the code to change whatever behavior you don’t like. I havent seeing anything about an acceptance test for Lemmy instances or anything that requires someone to use an unaltered version of Lemmy. How do you know the server admin isn’t already doing all of this? You don’t. Don’t expect privacy in public spaces.

azron,

So you have raw database access and you can see that data. Why is this surprising? The systems I’ve used that solve storing data encrypted have massive usibility hits around exchanging and authenticating keys to a point where it sucks so bad I just want to disable it (matrix is a good example, non question their key exchange bullshit is hindering their adoption). I’m not saying this couldn’t be fixed but should it? Most services that use a database will be inline with your discovery of how Lemmy uses that database. Storing something encrypted that is meant to be viewed publicly is the same outcome with more steps. If someone cares enough to monetize it just patch the code to change whatever behavior you don’t like. I havent seeing anything about an acceptance test for Lemmy instances or anything that requires someone to use an unaltered version of Lemmy. How do you know the server admin isn’t already doing all of this? You don’t. Don’t expect privacy in public spaces.

azron,

Try holding your power button for a bit of time or letting your battery run down. Phones absolutely turn off

azron,

Big thank you to all the hard work and the neck break development pace lately!!

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • uselessserver093
  • Food
  • aaaaaaacccccccce
  • test
  • CafeMeta
  • testmag
  • MUD
  • RhythmGameZone
  • RSS
  • dabs
  • KamenRider
  • TheResearchGuardian
  • KbinCafe
  • Socialism
  • oklahoma
  • SuperSentai
  • feritale
  • All magazines