kherge

joined 1 year ago
[–] [email protected] 3 points 9 months ago

Every credit union I have been a part of had some home brewed security system that did not follow best practices. Really felt like they contracted out to some kid still in college just to have something online.

I’m certain there are better CUs out there, but I think the issue is most can’t afford much better.

[–] [email protected] 5 points 10 months ago

Could you please compare WebAuthN to your suggestion? What are the pros and cons as they relate to each other?

[–] [email protected] 8 points 10 months ago

That last one reads like C’thulhufactor.

[–] [email protected] 6 points 1 year ago

Some thoughts based on personal experience:

  1. File was edited after error was reported, but before investigating it. (Editing, code formatter, etc.)
  2. Build cache was not cleared, so old source was used.
[–] [email protected] 2 points 1 year ago (8 children)

Pessimistic: Apple lawyers have arguments prepared that DRM'ing individual components does not violate this law.

Less Pessimistic: Apple got a sufficient head start in supporting third-party repairs that it would be beneficial for them to get this law passed so that other manufacturers scramble to catch up.