vk6flab

joined 8 months ago
[–] vk6flab@lemmy.radio 2 points 9 hours ago (1 children)

Does it still take forever to launch if you have more than a screen full of tokens?

Does it still only show four characters of the editable component of the name?

Does it still refuse to show the secret as text if you load a QR code?

[–] vk6flab@lemmy.radio 1 points 9 hours ago

I'm still a "native" pendant and use Docker to bridge the gap.

[–] vk6flab@lemmy.radio 4 points 11 hours ago (1 children)

I use Debian for anything that matters. The release cadence means that stuff just works and keeps working. You cannot beat the documentation and I've been using it for 25 years.

I'm not touching anything Redhat / Fedora with a barge pole.

Not sure what the attraction to Mint is.

Never used OpenSUSE.

[–] vk6flab@lemmy.radio 6 points 1 day ago

PSA to disable Google Assistant:

  1. Launch Google.
  2. Tap on your user icon in the top right.
  3. Tap on Settings.
  4. Tap on Google Assistant.
  5. Tap on General.
  6. Tap on the Google Assistant toggle.
  7. Tap on "Turn Off".
[–] vk6flab@lemmy.radio 8 points 1 day ago (1 children)

I wonder what the world would look like if these technology layoffs happened from the top down?

[–] vk6flab@lemmy.radio -3 points 1 day ago (2 children)

Black Friday is a marketing exercise to get you all riled up about the massive savings you will receive if you buy something RIGHT NOW.

Suffice to say that the actual bargains on the day are far and few between.

If you actively track pricing you'll discover that the price goes up before the event, then drops to the same or slightly lower pricing on the day. The "bargain" is notional at best.

Then there are the "pre Black Friday" sales, and the "Cyber Monday" ones afterwards. It's all just marketing.

If you want an actual bargain, find what you're looking for, set a price watch on it and track it for as long as you have patience. When you're ready, buy it from your preferred supplier and get them to price match the amazing price.

As far as refurbished goes, ask yourself what is the upside for the supplier to give away any bit of return on their spend to refurbish the item in the first place?

[–] vk6flab@lemmy.radio 48 points 1 day ago

Keyboard Not Detected, Press F1 to Continue

 

This is a sobering post that revisits the notion that given a project, how many developers have to be hit by a bus before it stalls.

According to the methodology explained in the article, in 2015 it took 57 developers for the Linux kernel to fail, now it appears that it takes 8.

That's not good.

[–] vk6flab@lemmy.radio 4 points 6 days ago

It's fascinating to me that this looks like half a dozen or so radio stations I've been in. It's especially fun at 1am in the morning.. (*)

Only one station I've been at looks completely different, ABC Radio in Perth, but that was purpose built 20 years ago and it's also a TV station.

(*) I have scared the crap out of myself and others on more than one occasion because radio studios are sparsely populated and sound dampening is essential.

[–] vk6flab@lemmy.radio 2 points 6 days ago

To enjoy yourselves doesn't require that you all buy the latest gaming rig or even something new or identical. As long as what you decide on has games in common, you're good.

[–] vk6flab@lemmy.radio 8 points 1 week ago (1 children)

"The beatings will continue until morale improves."

[–] vk6flab@lemmy.radio 3 points 1 week ago (2 children)

I am not privy to your financial situation, but can you three pool your resources and find a common platform?

[–] vk6flab@lemmy.radio 3 points 1 week ago (1 children)

I'm not eligible to vote in your country. In mine, voting is mandatory and there are no stickers, just democracy sausages to aid in the funding for local polling places like schools and community halls.

https://en.m.wikipedia.org/wiki/Democracy_sausage

 

A cookie notice that seeks permission to share your details with "848 of our partners" and "actively scan device details for identification".

 

How are you storing passwords and 2FA keys that proliferate across every conceivable online service these days?

What made you choose that solution and have you considered what would happen in life altering situations like, hardware failure, theft, fire, divorce, death?

If you're using an online solution, has it been hacked and how did that impact you?

 

I've been using VMware for about two decades. I'm moving elsewhere. KVM appears to be the solution for me.

I cannot discover how a guest display is supposed to work.

On VMware workstation/Fusion the application provides the display interface and puts it into a window on the host. This can be resized to full screen. It's how I've been running my Debian desktop and probably hundreds of other virtual machines (mostly Linux) inside a guest on my MacOS iMac.

If I install Linux or BSD onto the bare metal iMac, how do KVM guests show their screen?

I really don't want to run VNC or RDP inside the guest.

I've been looking for documentation on this but Google search is now so bad that technical documents are completely hidden behind marketing blurbs or LLM generated rubbish.

Anyone?

 

There is a growing trend where organisations are strictly limiting the amount of information that they disclose in relation to a data breach. Linked is an ongoing example of such a drip feed of PR friendly motherhood statements.

As an ICT professional with 40 years experience, I'm aware that there's a massive gap between disclosing how something was compromised, versus what data was exfiltrated.

For example, the fact that the linked organisation disclosed that their VoIP phone system was affected points to a significant breach, but there is no disclosure in relation to what personal information was affected.

For example, that particular organisation also has the global headquarters of a different organisation in their building, and has, at least in the past, had common office bearers. Was any data in that organisation affected?

My question is this:

What should be disclosed and what might come as a post mortem after systems have been secured restored?

25
submitted 7 months ago* (last edited 7 months ago) by vk6flab@lemmy.radio to c/privacy@lemmy.ml
 

U2F keys can be purchased online for the price of a cup of coffee. They're being touted as the next best thing in online security authentication.

How do you know that the key that arrives at your doorstep is unique and doesn't produce predictable or known output?

There's plenty of opportunities for this to occur with online repositories with source code and build instructions.

Price of manufacturing is so low that anyone can make a key for a couple of dollars. Sending out the same key to everyone seems like a viable attack vector for anyone who wants to spend some effort into getting access to places protected by a U2F key.

Why, or how, do you trust such a key?

The recent XZ experience shows us that the long game is clearly not an issue for some of this activity.

view more: next ›