ShortN0te

@ShortN0te@lemmy.ml

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Certification for closed source software

Is there any type of third-party certification for closed source software, similar to how we have ISO9001 for quality management? I’d prefer companies provide their software as open source, however I can imagine cases where the software genuinely doesn’t do anything malicious but might still contain trade secrets that the...

ShortN0te,

That certificate would not proof anything. Things can be overlooked or hidden enough. More eyes = more better. OS is no guarantee either.

Also, it would be way too expensive, money and time wise. Every new Version would need to be certified.

ShortN0te,

Took them long enough. Most Linux distros have a simple toggle for Disk encryption for years. And as far as i am aware Apple has it too. And basically every mobile OS is encrypted by default as well. iOS and Android

ShortN0te,

You didn’t store the key anywhere but on that disk.

Windows does not let you store the recovery key on an encrypted drive.

The rest only means, we need to deal better with our data. All the above basically also applies when you HDD or SSD dies, which can happen any time.

Backups is what you need, not an unencrypted drive.

ShortN0te,

Yep but at this point it is obvious to the user that this is not the way it is supposed to be. When you want to shoot yourself in the foot…

ShortN0te, (edited )

You can not find that Option via the default Settings menu, you have to search for it or use the outdated control panel.

Also Windows Home edition does not have this option.

Edit: you can find it actually under Windows security.

Still, it never pops up during installation.

ShortN0te,
ShortN0te,

There are even reported cases where Microsoft support used that tool to activate Windows Licenses when there are problems with the License of a customer.

ShortN0te,

Why not file a bug report when it does not find all your photos?

Also may file a feature request to delete photos after set period from your device via immich?

ShortN0te, (edited )

You could use things like ray tracing to determine if one player can be seen by another on the serverside and only send packages when they can see.

But to resource heavy to do that.

Edit: Thinking about it, you simply have to render the whole map with all players server side and based on that determine which players can see each other and based on that send the information to the clients.

ShortN0te,

That’s exactly what i said.

Still no reason to put a root kit on the customers PC.

ShortN0te,

Passkeys are not passwords. When you authenticate using passkeys you will proof that you have the secret (passkey), but you will never reveal that secret to the service you are authentication against.

So even if someone is able to steal that package containing the answer, that answer will not be valid a second time.

ShortN0te,

The difference is, that even if you enter the “password” on a phishing site, it is useless. Or when the server is compromised.

The only way the passkey can get compromised, is when the device that holds it gets compromised.

The same reason why hardware tokens for things like FIDO or U2F are recommended.

ShortN0te,

The user does not need to understand it. A user does not understand https or hashing and salting. Still, every one of these is important these days for online security.

I am not a huge fan of passkeys themself, especially when the secrets are held by big tech, but they promise better security and protection against command n attacks like phishing.

ShortN0te,

Its like the key in the Chip. But yes fundamentally it is like that. Now the Key needs to be stored somewhere safe like in your Phones secure enclave or in the case of your credit card a so called smart card (or sim card etc.)

ShortN0te,

DoT also encrypts the request, so the ISP cannot spy on the Domain Name you have requested.

And thanks to Https the ISP only sees the IP address which cannot in every case be resolved to a unique Domain, especially large sites that are hosted on service providers like Cloudflare, amazon etc etc

ShortN0te,

That is correct. HSTS helps to some degree but the very first request is still unprotected.

ShortN0te,

Security by obscurity is no security.

ShortN0te,

Imagine that the xz exploit actually made it into your server, so your sshd was vulnerable. Having it on another port does seem helpful then.

Nope. Your entire server can be scanned in less than a second for an open ssh port.

IPv6 does not change the fact since when your server is attacked the hist IP is already known.

ShortN0te,

disable root login

That does not do much in practice. When a user is compromised a simple alias put in the .bashrc can compromise the sudo password.

Explicitly limit the user accounts that can login so that accidentally no test or service account with temporary credentials can login via ssh is the better recommendation.

ShortN0te,

guess a username and a password.

Security by obscurity is no security. Use something like fail2ban to prevent brute force. When you use a secure password and or key this also does not matter much.

ShortN0te,

Who the hell is pulling the docker-compise.yml automatically every release? I find myself already crazy by pulling the latest release but the compose file is just a disaster waiting to happen.

ShortN0te,

Depends on the country you life in. And even in the USA it is to my knowledge not correct. They can try to crack it themself but you have not to comply.

ShortN0te,

But you can be easily tricked. Even easier than with the fingerprint.

“Hey, can you look at those pictures?”, shows some printed out pictures with the phone hiding behind and then quickly just dropping the pictures.

ShortN0te,

Probably a “have a look at this” and the 2 seconds before you realize that you are currently unlocking your phone, would be enough.

ShortN0te,

No this is also not correct. Paying for an ad free experience still seems to be valid.

What was ruled here is, that it is not considered a free choice to choose between paying money or paying with your data to access the service.

According to the EU law the user consents to harvest the digital data must be freely given.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • kavyap
  • DreamBathrooms
  • osvaldo12
  • magazineikmin
  • InstantRegret
  • everett
  • Youngstown
  • ngwrru68w68
  • slotface
  • rosin
  • GTA5RPClips
  • tester
  • PowerRangers
  • anitta
  • thenastyranch
  • mdbf
  • ethstaker
  • cisconetworking
  • Durango
  • vwfavf
  • normalnudes
  • tacticalgear
  • khanakhh
  • modclub
  • cubers
  • Leos
  • megavids
  • All magazines