I think they call them devops now.
johannesvanderwhales
Looks like a projection set, so no, they're pretty bad for games.
I know baseball does this in the US. Dunno about football.
You realize that voting process is organized by individual states and hence is completely different depending on where you live, right? Some states are quite good about it and some are not.
Pixel 7 pro here. They're overpriced at release but if you're willing to buy last year's model they're pretty good.
Because social networks are only as good as the people who are on them.
If you want to roll your own with keepass that's fine, but most people will want a more comprehensive solution.
Yes, lots. And not because I'm an extrovert. It's a very commonly used life skill and I wouldn't, for example, be able to do my job without it.
If you're paranoid about this, go buy a yubikey and use that to secure your device/access to your passkeys. Being able to secure your own data instead of relying on the admin who may or may not know what they're doing to secure the server is an advantage of passkeys.
It''s really up to the end device (and the user of said device) to decide how much security to put around the local keys. But importantly, it also requires access to the device the passkeys are stored on which is a second factor. And notably many of the implementations of it require biometrics to unlock.
The "one password" thing is also true of password managers, of course. One thing about having one master passphrase is that if you do not have to remember 50 of them, then you can make that passphrase better then you otherwise might, plus it should be unique, which prevents one of the most common attack vectors.
If you've ever used ssh it's very similar to how ssh keys work. You create a cryptographic key for the site; this is the passkey itself. When you go to "log in" the client and server exchange cryptographic challenges, which also verifies the site's identity (so you can't be phished...another site can't pretend to be your bank, and there are no credentials to steal anyway). Keys are stored locally and are generally access restricted by various methods like PIN, passphrase, security key, OTP, etc. When you're entering your PIN it's how the OS has chosen to secure the key storage. But you've also already passed one of the security hurdles just by having access to that phone/computer. It is "something you have".
I posted a thing from 8 bit theater and it got a lot of upvoted. Definitely old people.