sebastiancarlos@lemmy.sdf.org to Linux@lemmy.mlEnglish · 1 year agoHow To Become A Hacker: A Step-By-Step Guidemedium.comexternal-linkmessage-square19linkfedilinkarrow-up198arrow-down112cross-posted to: programmer_humor@programming.devprogrammerhumor@lemmy.ml
arrow-up186arrow-down1external-linkHow To Become A Hacker: A Step-By-Step Guidemedium.comsebastiancarlos@lemmy.sdf.org to Linux@lemmy.mlEnglish · 1 year agomessage-square19linkfedilinkcross-posted to: programmer_humor@programming.devprogrammerhumor@lemmy.ml
minus-squareWarl0k3@lemmy.worldlinkfedilinkarrow-up10·1 year agoFun background info: Trusted Representatives don’t actually carry their shard of the key (to prevent exactly this scenario), they have (iirc) a keycard which allows them to access the secure storage medium where their different pieces are stored.
minus-squareFauxLiving@lemmy.worldlinkfedilinkarrow-up8·1 year ago to prevent exactly this scenario I’d love to be in the group that brainstormed this exact scenario
minus-squaresebastiancarlos@lemmy.sdf.orgOPlinkfedilinkarrow-up6·1 year agoEvery software system worth its salt should have safeguards against Nokia nunchuck attacks.
minus-squareFauxLiving@lemmy.worldlinkfedilinkarrow-up3·1 year agoAnd now we move on to the second item on the agenda: Advanced Protection against Shrubbery and Why We Need It
Fun background info: Trusted Representatives don’t actually carry their shard of the key (to prevent exactly this scenario), they have (iirc) a keycard which allows them to access the secure storage medium where their different pieces are stored.
I’d love to be in the group that brainstormed this exact scenario
Every software system worth its salt should have safeguards against Nokia nunchuck attacks.
And now we move on to the second item on the agenda: Advanced Protection against Shrubbery and Why We Need It