• 0 Posts
  • 21 Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle







  • MetaCubed@lemmy.worldtoLinux@lemmy.mlBtw
    link
    fedilink
    arrow-up
    1
    ·
    7 months ago

    I’m going to very sincerely disagree. You can see it as misinterpretation if you like, but I believe there’s functionally no difference between the two statements you’ve provided and as long as the right is trying to come up with any excuse to outlaw our existence, its optically beneficial to come up with ways of educating people who may be “eggs” about being trans/enby that are informative, but are less likely to fuel a deranged groomer witchhunt. I’m glad it helped you and your friends, but given the political climate, I believe we should avoid terms that endanger us more than needed.

    Continue using it, I certainly won’t stop you. But I’m not going to start.



  • MetaCubed@lemmy.worldtoLinux@lemmy.mlBtw
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    7 months ago

    Frankly idgaf about the prime directive (edit: this is perhaps an exaggeration, I meant I wasn’t necessarily referring to the prime directive) , but as an enby person, I think going around saying “doing this makes you an egg” is pretty antithetical to people not wanting to be judged for not complying with the gender roles that correspond with their assigned gender.





  • The point is that if someone really wants to get into your device, they will. It doesn’t matter if youre using open source firmware, in a custom implementation of linux, on a MIPS CPU, and you personally build every package from source and complete a compliance code review before installing it, etc.etc.etc. If government agency x is targeting you specifically, your best line of security is to lock your device in a safe, take a boat into the middle of the ocean, and then dump it at an unrecorded location and never retrieve it.

    A device is only secure as long as you are not using it, and it is not accessible physically, or by network.

    You do you dude, I’m just saying your advice is awful for the average user.



  • Does your threat model involve The Mossad? There’s no way on earth that you are genuinely remembering multiple 512 byte random passwords, let alone actually taking the time to type them in.

    Having a password manager, with MFA, a strong master password, and rule based device verification is ultimately more secure as you can have every password be randomized.

    Best practices are best practices for a reason. I recommend you follow them.


  • Genuinely terrible advice. Every popularly available password manager service hashes all your passwords, if they have a data breach they have extremely strict reporting compliance and the majority of services will re-hash all your passwords. If youre so extremely concerned about that, host your own.

    But what concerns me the most is

    Unless they specify they only store the hash I refuse to sacrifice one of my strong passwords.

    … What to you mean sacrifice?




  • I often think that to myself as well to be honest. Originally, it was mostly because it’s the only “secure” system that I’m currently hosting and I wanted the ability to airgap it without taking the rest of my homelab offline.

    I mostly use my homelab for tinkering/applying what I’m learning without breaking a production system at work so needless to say I’ve learned a lot since I originally deployed bitwarden… Now it’s just because I’m too lazy to spin a new vm and migrate everything.