shapis

joined 4 years ago
[–] [email protected] 2 points 6 days ago

Same. And it’s not just the amount of content.

The amount of times I’ve had a reply with someone obviously trying to be pedantic and argumentative saying “define common thing” is off the charts.

[–] [email protected] 2 points 2 weeks ago (1 children)

iPhone 16 pro. Too early to tell but this might be my favorite ever.

Previous ones I also really enjoyed were all nexus or pixels but they all inevitably shit themselves after a couple years of use. Most recent one pixel 7 just decided it was gonna drain 6% battery per hour while idling out of nowhere. And nothing I tried fixed it. And I tried a lot.

[–] [email protected] 6 points 3 weeks ago (2 children)

Just proton. VPN + drive + pass is great.

[–] [email protected] 1 points 3 weeks ago

Not often. Mostly because the official app is so unbearably trash.

[–] [email protected] 5 points 1 month ago

Proton pass.

Used bitwarden for a long time til I lost my 2fa and lost the account. I also lost proton’s 2fa and they helped me get the account back. Been a customer since.

[–] [email protected] 3 points 1 month ago* (last edited 1 month ago)

Passkeys are basically passwords that you don’t send to the server. So they are safer against phishing.

Basically the server has a message. They will scramble it with your public key. And send it to you. Your private key unscrambles the message and then you send the message back to them. So if they receive the original message back. They know you are you. And they never got their hands on your private key at any point. It’s awesome.

2fa is an entirely different thing. And I do wish it was more standard how it works. Some places if you lose it you lose your account (bitwarden). Others you don’t (protonmail).

Everyone should use passkeys. 2fa you have to decide if your case warrants it.

Edit: example of passkeys:

Step 1: they have the message “cat”

Step 2: they encrypt it with your public key and it becomes “acm”

Step 3: they send you the encrypted message “acm”

Step 4: you decrypt the message “acm” into “cat” with your private key.

Step 5: you send them back the message “cat”

Only your private key would be able to decrypt something encrypted with your public key. So they now know you are you. And they never got a hand on your private key. It’s the same as a password except you never send it directly to the server.

[–] [email protected] 2 points 1 month ago

Oh. I tried a bit before giving up. But lack of compatibility plus the insanely unreliable pixel battery just made me switch back to iPhone.

Thank you for the link though.

[–] [email protected] 4 points 1 month ago (4 children)

Tried to switch to graphene for a bit. Way too many apps don't work in it.

[–] [email protected] 4 points 4 months ago (2 children)

Depends on the license I suppose.

[–] [email protected] 5 points 5 months ago (6 children)

Is not using Adobe a realistic option in professional settings atm?

[–] [email protected] 5 points 5 months ago

Just go on Khan academy and do a lesson a day. It will take time(years) but you'll learn.

view more: next ›