
Risk management > blind security rules. The latter is security theatre.
This is a secondary account. My main account is listed below. The main will have a list of all the accounts that I use.
Risk management > blind security rules. The latter is security theatre.
It’s bizarre how despite these recommendations I’ve had multiple workplaces that change passwords monthly. Add stringent complexity requirements, and you get sticky notes everywhere with full logon details.
A sign in button would be about the same level of security.
I feel like a gigabyte of installation materials is probably a bit more than necessary.
Eczema, where your typical lotion just won’t cut it.
I hate Pinterest links. I don’t even click if it looks like Pinterest. Might as well not exist.
There are moments where it’s like playing a really good game from growing up but for the first time all over again.
Hear yourself a-crackinn
Like an old kaa-zoo 🎵
Yup. My neighbor’s car is outside right now getting their daily parking ticket. They just pay them because they can afford it.
As a security researcher, running each site in its own process isn’t enough. Chrome has a much stronger multiprocessing model on most platforms. For example, Chrome on Android sandboxes between processes whereas Firefox simply relies on the built-in Android sandbox, which provides limited protection between these processes. It’s much easier to break out of the sandbox in Firefox because it’s easier to move laterally, for one. Those processes have to communicate with each other at some point.
But, don’t believe me just because I claim any sort of credential on the Internet. It’s such a difference in security that GrapheneOS strongly discourages using Firefox for its weak implementation in addition to the link I provided above. From the link:
Worst of all, Firefox does not have internal sandboxing on Android. This is despite the fact that Chromium semantic sandbox layer on Android is implemented via the OS isolatedProcess feature, which is a very easy to use boolean property for app service processes to provide strong isolation with only the ability to communicate with the app running them via the standard service API. Even in the desktop version, Firefox’s sandbox is still substantially weaker (especially on Linux) and lacks full support for isolating sites from each other rather than only containing content as a whole.
I love Firefox. I use it anyway. It’s not insecure. But it’s absolutely not as secure because it lacks modern exploit mitigations. Running process per site is an improvement but it’s still less secure than the architecture used in Chrome.
EDIT: Sound less entitled.
This is why I use Firefox! For freedom.
Great, now implement modern exploit mitigations and sandboxing like Chrome uses. Firefox is objectively less resistant to exploitation. Some Firefox security has improved since the article was written, such as some sandboxing on Windows, but it’s definitely not as mature.
I’m not writing that Firefox is insecure. Security is very important to Firefox! However, Chrome has had more work done in the realm of browser hardening.
Google intentionally gimps what they serve to their competition to make them look worse. It’s definitely an anticompetitive practice, and they’re walking a fine line about it to not get in legal trouble.
They do, but Chrome is actively trying to remove support for most advanced ad-blocking capabilities. Further, Google has no financial incentive to make their browser hospital to ad blockers as Google makes most of their money from advertising.
Google has pushed some half-baked ideas for how the web could work without having to block ads. Ad blocks aren’t best buddies with Google.
Perhaps the replacement battery was manufactured a while ago?
On the Internet, nobody knows you’re a dog.
I’m onto you.
Is this basically Ubuntu?
They do intentionally hold back packages based on a random value to do gradual rollouts. See below:
https://askubuntu.com/questions/1431940/what-are-phased-updates-and-why-does-ubuntu-use-them
Could this be your issue?