This profile is from a federated server and may be incomplete. Browse more on the original instance.

qqq,

Most responsible climbers bring something with them to pack it out, but there are some irresponsible ones that do what the comment above mentioned. That is the exception, not the rule though.

qqq,

They’re just having fun

qqq, (edited )

I hate getting into these discussions.

This is Arnaud Petit and Stéphanie Bodet, two professional climbers with far more experience than you. They are doing the second ascent of a 900 meter 8a on Angel Falls (Rainbow Jambaia, 31 pitches) which is about the same height as El Capitan in Yosemite National Park. Here is a story about it. You almost never plan to climb routes this long in a single day, especially not on the second ascent. They most definitely planned to sleep on the wall and brought the proper equipment. This is called big wall climbing

Just be happy for people doing what they love and do what you love: your life will be better. We’re all motivated by different things.

qqq,

This has always been a weird take, what do you think attracts people to that kind of SAR work? Generally a love for the outdoors and activities like this. You’ll have a hard time finding someone capable of high angle rescue that doesn’t enjoy or understand climbing as a sport.

qqq,

I’ve never had an issue using banking apps from Lineage. I use 3 different pretty mainstream ones

qqq,

A lot of weird hate for 1Password on Lemmy the past couple days. I highly recommend reading their white paper, I think most of the hate comes from ignorance of what they are actually doing.

1passwordstatic.com/…/1password-white-paper.pdf

qqq,

1Password is a solid service if you’re OK with the proprietary aspect. I use it personally and we use it at work (I’m an infosec consultant)

qqq,

This is not necessarily true.

For example, consider the case of a 1Password vault falling into the hands of an attacker. They do not have the option to just crack your password, as the password is mixed with a randomly generated value to ultimately derive the key. They would need to simultaneously brute force your password and that random value. This should almost be impossible. However, given access to a client that already has knowledge of the secret value, it would fall back to brute forcing the password.

qqq,

Not sure if you’ve read this but it might help get started.

1passwordstatic.com/…/1password-white-paper.pdf

qqq, (edited )

They don’t have your password in any form. The random key is generated with a CSPRNG, we don’t know how to crack those. They aren’t hiding behind secrets: it’s all documented right here 1passwordstatic.com/…/1password-white-paper.pdf

1Password is quite good.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • uselessserver093
  • Food
  • aaaaaaacccccccce
  • test
  • CafeMeta
  • testmag
  • MUD
  • RhythmGameZone
  • RSS
  • dabs
  • KamenRider
  • TheResearchGuardian
  • KbinCafe
  • Socialism
  • oklahoma
  • SuperSentai
  • feritale
  • All magazines