Emma_Gold_Man

joined 1 year ago
[–] [email protected] 1 points 6 months ago* (last edited 6 months ago) (1 children)

No bother!

For customization, you want a MUD client rather than a standard telnet client. I used zMUD back in the day, but FLOSS was harder to come by back then. These days, I'd go with mudlet.

[–] [email protected] 1 points 6 months ago (4 children)

I never really paid attention to the level gain ratio. I'd look here for that kind of question.

[–] [email protected] 3 points 6 months ago (6 children)

Since people are posting games, I'll throw in Realms of Despair

[–] [email protected] 106 points 6 months ago

That wasn't luck - it was best practice backup strategy.

[–] [email protected] 4 points 6 months ago

IT has a level of access to systems that makes management nervous. The fear is that an IT person in financial trouble could use that to embezzle, or be pressured to sell access to a malicious third party.

[–] [email protected] 3 points 6 months ago (2 children)

Common in IT roles as well.

[–] [email protected] 5 points 6 months ago

The way this works in the server world is "95th percentile" billing. They track your bandwidth usage over the course of the month (probably in 5 minute intervals), strike off the 5% highest peaks, and your bill for the month is based on the highest usage remaining.

That's considerably more honest than charging you based solely on the highest usage you could theoretically use at any time point in a 24 hour period (which is how ISPs define the "max bandwidth") and then charging you again or cutting off your service if you use more than a certain amount they won't even put in writing.

[–] [email protected] 3 points 7 months ago

Depends who you need privacy from. I recall Stallman's advice about VPNs - that to avoid having your information turned over you should choose a VPN from a country whose government is no friend of your government. Depending on your threat model, I could see this being the same principle

[–] [email protected] 37 points 7 months ago (5 children)

Probably not. It looks like it's setting the fake address before reading the tunnel parameters, where the real address is stored. Probably a kludge in case the connection address is undefined so the program doesn't crash. So check whether the address is included there.

Also check the function that establishes the connection. 10.1.1.1 is not a public subnet, so unless there is a VPN device listening at the local address, the tunnel should fail to establish and throw an error, triggering the exception clause in that code. Again, you'll want to confirm that in the code.

[–] [email protected] 2 points 7 months ago* (last edited 7 months ago)

The money in calligraphy is usually made on wedding invitations, diplomas, "fine fining" menus, and corporate award certificates

[–] [email protected] 1 points 8 months ago

If your usecase and threat model don't require the pinpad, Onlykey Duo is worth a look. No pin, USB A or C, and still gives you 6 slots to support any combination of Fido2, TOTP, SSH, PGP, and password storage.

[–] [email protected] 1 points 8 months ago* (last edited 8 months ago) (1 children)

Manually keying in the pin is only needed when plugging in the device. Challenges for TOTP, FIDO2, etc. are a configuration option, and are only 3 digits if enabled (press any button if disabled).

As for "excessive amount of security", security as an absolute measure isn't a great way to think about it. Use case and threat model are more apt.

For use case, I'll point out it's also a PGP and SSH device, where there is no third party server applying the first factor (something you know) and needs to apply both factors on device.

For threat model, I'll give the example of an activist who is arrested. If their e-mail provider is in the country, they can compel the provider to give them access, allowing them to reset passwords on other more secure services hosted outside the country. The police now have the second factor (something you have), but can't use it because it's locked.

view more: next ›