Gestrid

joined 2 years ago
[–] Gestrid@lemmy.ca 20 points 11 months ago

Every now and then, I'm reminded that Skype is somehow still alive.

[–] Gestrid@lemmy.ca 3 points 11 months ago

At that point, I would've just googled the phone number.

[–] Gestrid@lemmy.ca 17 points 11 months ago

I thought extensions don't run in incognito mode?

They don't. Unless you check the box that allows them to. And I'm sure Google has already checked that box by default.

[–] Gestrid@lemmy.ca 9 points 11 months ago (2 children)

Are you talking about the "apps" that Chrome used to support? They removed the feature years ago to reduce bloat and RAM usage or something like that.

Before they removed the feature, I had actually figured out how to create my own "apps" that'd simply load webpages I visited often at the time, like Twitch.

[–] Gestrid@lemmy.ca 4 points 1 year ago* (last edited 1 year ago) (1 children)

then i found you can't export your data from Authy

Exporting data from a 2FA app sounds like the opposite of secure. Not to mention you don't want your 2FA codes on Authy (or any other 2FA app) to remain valid if you're not using it.

When I switched from Google Authenticator to Authy years ago, I went through each 2FA-enabled account one by one to disable 2FA and then re-enable it using Authy. It's a long process depending on how many accounts you have 2FA enabled on, but it's worth it.

Reading the OP, looks like it's time to generate new keys for all my 2FA accounts.

[–] Gestrid@lemmy.ca 1 points 1 year ago

The way I read it, they already (in the third paragraph of the blog post) had companies auditing their backend technology and (in the fourth paragraph) were starting to have companies audit their apps, too.

[–] Gestrid@lemmy.ca 2 points 1 year ago* (last edited 1 year ago) (7 children)

I admittedly should've done more research before my first comment, but it does actually turn out that everything I said is true. Proton's technology was previously audited by Mozilla and is currently audited by SEC Consult and other companies regularly, and the audits are available for everyone to view. Additionally, they do have a bug bounty program. Also (and this is something I didn't mention), the ProtonVPN and Proton Mail apps are all open source.

[–] Gestrid@lemmy.ca 8 points 1 year ago* (last edited 1 year ago) (1 children)

Fax machines are actually still pretty widely used in corporate America (but not in households at all). Especially insurance and medical companies. I remember having to ask my dad years ago to fax something for me from his work (a bank's corporate office) since we didn't have one in the house. (I don't remember what the fax was for.)

[–] Gestrid@lemmy.ca 3 points 1 year ago (9 children)

That's where the second and third paragraphs come in. Because other companies likely test it themselves, too.

They'll typically report security bugs privately and then, after X amount of months, publicly announce the bug. Doing it this way will, ideally, force the other company to patch the bug prior to the announcement. If not, they'll end up with a publicly known security bug that bad actors can now exploit. The announcement will also let the public (including companies) know to update their software.

[–] Gestrid@lemmy.ca 11 points 1 year ago (14 children)

I imagine it probably is inspected, just not by the public. They probably do it themselves.

And they may have contracts with certain companies specializing in this sort of security that also inspect it.

And there's also the cybersecurity companies that test it whether they're contracted or not. At some companies, their entire job revolves around finding bugs (especially security bugs) in other companies' software.

Just because it's not on GitHub doesn't mean it's not a good product that hasn't been thoroughly tested.

[–] Gestrid@lemmy.ca 1 points 1 year ago

People can usually unlock the carrier on their own. Many phones (or at least every phone I've ever gotten from T-Mobile) even come pre-installed with a carrier unlocking app. It's just not automatic, and certain conditions need to be met.

People may also sometimes be able to buy phones already unlocked directly from the manufacturer if they want to. (Whether or not they're able to do this depends on the manufacturer.)

[–] Gestrid@lemmy.ca 22 points 1 year ago

IRS: "Remember, you broke up with us."

view more: ‹ prev next ›