

And for the full Linux experience do it at the perfect moment, such as when you’re in a lecture or customer presentation!
And for the full Linux experience do it at the perfect moment, such as when you’re in a lecture or customer presentation!
Those people are idiots. You always need to check the credentials and history of people telling you something, and even then - if they’re an expert in security they may know nothing about electronics or explosives or how secret agencies operate.
And yes, news can be really unreliable - on purpose or just out of mistakes. Gotta always keep that in mind as well, but it also reeeally depends on the particular media company.
What was the comment? That the source is untrustworthy? Why was it removed?
As a pentester, if I see XML in HTTP I start crying.
There are wave lengths that you cannot perceive, like, I don’t know… UV, maybe?
The big deal is that you are now forced to create an account with yet another service and give them analytics about your behavior, for literally no benefit to you.
Even though this is widely accepted, this is just not okay in any case. Not when Ubisoft did it, not now.
Definitely Signals Music Studio. Really great guy and an excellent guitar teacher for harmony and song writing stuff.
He puts out a lot for free so I feel more than justified to send some money his way - his teaching has been instrumental (heh) for my progress and understanding of music.
You need to check out public key cryptography and digital signatures. Those are the basics of Fido.
When the private key is bound to a device it is not possible to fake or steal it through conventional methods. Passwords are the weakest link and an easy target for attackers - passkeys basically solve that.
User adoption depends on implementation, but everything is easier than remembering a secure password or using a password manager for most people. There needs to be an easy and secure way to distribute passkeys across devices, and any backup mechanisms may be a weak point. In any case: still better than passwords.
A platform is nothing but a reflection of its users and of humanity :) An empty canvas we can fill.
The firewalls are all backdoored too!
Jia Tan is most definitely not a person, just the publicly facing account of a group of people.
What is the trail of crumbs? Just some random email accounts?
This was in a big part a social engineering attack, so you can’t really avoid contact.
Caring about the technology of an app more than about its privacy is really strange to me, but you do you.
You can collaborate on WhatsApp or Signal as well, both messengers are using the end-to-end encrypted Signal protocol. Even in group chats. Telegram is not E2EE per default.
Of course, with WhatsApp Meta collects all your metadata so they have a very detailed network of basically all the people in this world… At least without all their messages.
Messages are only end-to-end encrypted if you use the Secure Messaging option. Otherwise everything passes the server in cleartext.
That means that anyone with access to those servers can read your messages.
Don’t you think there are better, more recent examples of this?
(Oh, I missed the instance I was on lol)
Feel like I’m destroying the dataset with QWERTY so I’ll wait until QWERTZ is available :)