bamboo

joined 2 years ago
[–] bamboo@lemm.ee 1 points 7 months ago

When a port is extremely high bandwidth, the number of them stops mattering much. I’m plugging everything into a dock via a single cable anyways, the rest go largely unused. We used to need a dozen ports because each one could only handle a single task and all were relatively low bandwidth.

[–] bamboo@lemm.ee 6 points 7 months ago (9 children)

Strongly disagree. I use a laptop with a thunderbolt dock. Being able to plug in a single cable to provide power, connect my monitor, all of my input devices, Ethernet, and anything else in a single cable is awesome. If I had to plug 10 things in manually it would be quite cumbersome. I disconnect the laptop daily as I bring it between work and home, as well as use it, well, as a portable laptop.

[–] bamboo@lemm.ee 3 points 7 months ago

iTerm2 works well enough

[–] bamboo@lemm.ee 3 points 7 months ago

I’m sure they’d get an exception

[–] bamboo@lemm.ee 6 points 7 months ago

Even if it is tedious, it is work that is worth doing.

[–] bamboo@lemm.ee 1 points 7 months ago

This disables biometrics, but doesn’t delete the decryption key in memory. This is sufficient to prevent being compelled to unlock with biometrics, but with the decryption key in memory, it is still possible to access data via an exploit. A full reboot deletes the decryption key until the user enters their pin.

[–] bamboo@lemm.ee 9 points 7 months ago

That’s just a passcode for practical purposes

[–] bamboo@lemm.ee 3 points 7 months ago

This is the case on iOS as well but restarting takes longer and more explicit interactions than pressing a button five times

[–] bamboo@lemm.ee 17 points 7 months ago (4 children)

I don’t know how he thinks he’ll reduce ultra-processed foods but that’s probably not the worst. Other stuff is 🤮

[–] bamboo@lemm.ee 2 points 7 months ago (1 children)

What exactly does Signal have to offer if one already uses iMessage with contact key verification?

[–] bamboo@lemm.ee 2 points 7 months ago

Not the same thing since this the device is still partially decrypted.

[–] bamboo@lemm.ee 3 points 7 months ago

Not necessarily. If you trust the code running on your device then there is no backdoor they could install on a server that would break e2ee. They would have to backdoor the client where the keys are.

view more: ‹ prev next ›