Could you please compare WebAuthN to your suggestion? What are the pros and cons as they relate to each other?
kherge
joined 1 year ago
That last one reads like C’thulhufactor.
Some thoughts based on personal experience:
- File was edited after error was reported, but before investigating it. (Editing, code formatter, etc.)
- Build cache was not cleared, so old source was used.
Pessimistic: Apple lawyers have arguments prepared that DRM'ing individual components does not violate this law.
Less Pessimistic: Apple got a sufficient head start in supporting third-party repairs that it would be beneficial for them to get this law passed so that other manufacturers scramble to catch up.
Every credit union I have been a part of had some home brewed security system that did not follow best practices. Really felt like they contracted out to some kid still in college just to have something online.
I’m certain there are better CUs out there, but I think the issue is most can’t afford much better.