WYGIWYG

  • 2 Posts
  • 1.13K Comments
Joined 1 year ago
cake
Cake day: September 24th, 2024

help-circle


  • Imo, remotely programmable locks are Amazing.

    If my kid shows up locked out, he can ring the doorbell, it’ll message me whever I am, we can have a conversation, I can unlock door remotely.

    When we’re in vacation and we have a problem, I can disable/enable new users without giving anyone a key.

    If the battery dies, There a backdoor with the same keying and there’s a key hidden somewhere. If the WiFi is out, I just can’t remote unlock or enable/disable codes. It still works as a code/key lock.








  • Everybody does it differently. GitHub in particular allows multiple

    If you are doing development or admin work, I would greatly advise you to pick up a Yubi Key.

    My basic setup for any app/site that will allow it is two yubis and one passkey.

    One yubi in the safe with next of kin instructions, one on my key ring.

    Then any site that supports passkey, I’ll also have one of those there too.




  • You can read the cables, you can read the transceivers in the video card, in a lot of the screens you can even read the panel changing itself.

    Our ability is to remote sense EMF is absolutely ridiculous these days.

    Then there’s crap like the espionage where they change fan speeds. Or flash an infrared proximity sensor on a cell phone to exfiltrate data.


  • rumba@lemmy.ziptoProgrammer Humor@programming.devGitHub auth
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    2 days ago

    Those are awfully dangerous on their own these days.

    As soon as a poorly salted hash leaks or gasp, a hash with no salt, it’s super easy to reverse those passwords now.

    2FA severely reduces the danger of rainbow tables and keyloggers. The only real worry with 2FA is login replacement and interception. and passkey solves that, allbeit at the cost of complexity.





    1. password + 2FA AND/OR passkey required.
    • baby steps, start with getting them secure, then when most are ready start dropping the password
    • iron out the kinks, give all apps a chance to implement
    • if you only ever login with passkey and it asks you for 2fa, you can scrutinize the page more

    You can tell just from the response on this post people aren’t all ready for passkey yet, but you can’t wait fo them to decide they’re ready before you start.



  • Under passkey implementations, you need to unlock the passkey device with biometrics or passwords. Something you are/know (biometrics/passwords) and something you have (passkey).

    It’s not impossible to screw it up. Put your passkeys in bitwarden, reuse a password and don’t 2fa that.