vk6flab

joined 8 months ago
[–] [email protected] 2 points 8 hours ago (1 children)

Does it still take forever to launch if you have more than a screen full of tokens?

Does it still only show four characters of the editable component of the name?

Does it still refuse to show the secret as text if you load a QR code?

[–] [email protected] 48 points 1 day ago

Keyboard Not Detected, Press F1 to Continue

[–] [email protected] 3 points 1 week ago (1 children)

I'm not eligible to vote in your country. In mine, voting is mandatory and there are no stickers, just democracy sausages to aid in the funding for local polling places like schools and community halls.

https://en.m.wikipedia.org/wiki/Democracy_sausage

[–] [email protected] 3 points 1 week ago

Thank you, much appreciated.

[–] [email protected] 2 points 1 week ago (2 children)

I just looked on the Google Play store and can't find either of the apps you mention. Do you have a link?

[–] [email protected] 6 points 1 week ago

If you don't have any hair, it won't change colour..

(It's a joke, laugh)

Also, not for nothing, the human body changes daily. I'd recommend that you get used to it before you have an unhappy life pursuing battle against the inevitable.

[–] [email protected] 12 points 1 week ago (1 children)

I'm fairly sure that the price information shown on a Google Search result page is advertising that comes from a different source than the results do.

As far as I know, you could write a plugin for SearXNG to query suppliers and format the output as required.

I think that Google Shopping might be queried in the same way, but I've never looked into it deeply.

[–] [email protected] 1 points 1 week ago (1 children)

No, you didn't "edit" your mistake, you completely changed the meaning of your response which makes anything after it look absurd.

You originally stated that an algorithm was intelligence, the implication being that using your logic, you thought that a calculator was intelligent.

As far as the meaning of AI, you clearly don't understand the landscape surrounding the hyperbolic assertions made by ignorant journalism about the topic.

Machine learning is one aspect of the landscape, useful as it is, intelligence it is not.

LLM emissions on the other hand appear to emulate enough grammatically correct language to fool many people some of the time, leading to their mistaken belief that what is happening is intelligence rather than, at least from their perspective, magic.

(Any sufficiently advanced technology is indistinguishable from magic. -- Arthur C. Clarke)

So, intelligence it is not, Assumed Intelligence is what it is, or autocorrect gone uppity if you prefer, an algorithm either way.

[–] [email protected] 7 points 2 weeks ago (6 children)

Ignorance is bliss..

A.I. means Assumed Intelligence, despite what you might have read elsewhere. Using it to do "research" is how you're going to get first hand experience with so-called "hallucinations".

But you do you..

[–] [email protected] 19 points 2 weeks ago (2 children)

I'm an industry professional in ICT with 40 years experience.

I've come to form the view that industry certification is a vendor lock-in process created solely for the purpose of generating a guaranteed income stream for that vendor.

If your employer wants to spend its money on certification, by all means go for it as a learning experience.

If you have to pay for it yourself, I've yet to see any evidence that they represent a return on investment of any kind in your career.

That's not to say that learning should be abandoned, quite the opposite. In this industry, if you're not learning, you're going backwards.

Stay curious, read verociosly and try to figure out how stuff works and more importantly, how it breaks.

[–] [email protected] 33 points 2 weeks ago

How is this infuriating?

Would you like to sleep in a bed with clean sheets and have a shower in a clean cubicle?

How do you think that this happens?

 

A cookie notice that seeks permission to share your details with "848 of our partners" and "actively scan device details for identification".

 

How are you storing passwords and 2FA keys that proliferate across every conceivable online service these days?

What made you choose that solution and have you considered what would happen in life altering situations like, hardware failure, theft, fire, divorce, death?

If you're using an online solution, has it been hacked and how did that impact you?

 

There is a growing trend where organisations are strictly limiting the amount of information that they disclose in relation to a data breach. Linked is an ongoing example of such a drip feed of PR friendly motherhood statements.

As an ICT professional with 40 years experience, I'm aware that there's a massive gap between disclosing how something was compromised, versus what data was exfiltrated.

For example, the fact that the linked organisation disclosed that their VoIP phone system was affected points to a significant breach, but there is no disclosure in relation to what personal information was affected.

For example, that particular organisation also has the global headquarters of a different organisation in their building, and has, at least in the past, had common office bearers. Was any data in that organisation affected?

My question is this:

What should be disclosed and what might come as a post mortem after systems have been secured restored?

25
submitted 7 months ago* (last edited 7 months ago) by [email protected] to c/[email protected]
 

U2F keys can be purchased online for the price of a cup of coffee. They're being touted as the next best thing in online security authentication.

How do you know that the key that arrives at your doorstep is unique and doesn't produce predictable or known output?

There's plenty of opportunities for this to occur with online repositories with source code and build instructions.

Price of manufacturing is so low that anyone can make a key for a couple of dollars. Sending out the same key to everyone seems like a viable attack vector for anyone who wants to spend some effort into getting access to places protected by a U2F key.

Why, or how, do you trust such a key?

The recent XZ experience shows us that the long game is clearly not an issue for some of this activity.

view more: next ›