+1 for proton. Been using them for years now.
+1 for proton. Been using them for years now.
If it’s a MacBook that no longer gets updates from Apple then it’s probably from around 2014ish, and is definitely an Intel Mac. This is a great candidate for Linux. If you want an environment that is similar to Mac, go with gnome as the desktop environment. Outside of that, any of the major distributions should be fine. I’ve run KDE Neon, Ubuntu, and am currently running fedora on a 2014 iMac and all of them worked without issue.
Color me shocked that a meta product is sacrificing trust so the line continues to go up.
I mean, you could charge like $8 and then give the totally real people that are paying that money a blue checkmark? /s
Seriously though, I like the idea, but the verification has got to be easy to do and consistently successful when you do it.
I run my own matrix server, and the most difficult/annoying part of it is the web of trust and verification of users/sessions/devices. It’s a small private server with just a few people, so I just handle all the verification myself. If my wife had to deal with it it would be a non starter.
Not exactly what you’re looking for, but mysudo may work for what you want to do.
Correct me if I’m wrong, but doesn’t there have to be a code layer somewhere in there?
It’s like all those “no code” platforms that just obscure away the actual coding via a gui and blocks/elements/whataver.
Definitely. Not to be ignored, but for lots of yubikey users, also not something to be overly worried about.
I went into the article thinking I’d need to replace my keys, and after reading decided I’m a very unlikely target for this attack. My threat model doesn’t include nation states, so I’m gonna keep using my yubikeys for the foreseeable future.
I have been thinking about new hardware key(s) that can handle more than 20 passkeys, but that’s not a high priority for me right now.
It’s due to a cryptographic library implementation in a controller used in the yubikey. It’s a third party controller, and this isn’t exclusive to yubikeys either, a shitload of other stuff uses the same controller and is likely vulnerable to the same attack.
Also, the attack requires around $10k worth of equipment and physical access to the yubikey, so while a valid attack vector, it’s also not something to get into a panic about.
deleted by creator
Man I miss basic.
Depending on the file it’s either dot notation or flat case.
Awww. The poor pkcell!
What they’re saying: “we promise to support your device for seven years! Isn’t that great!”
What they mean: “We promise to keep our spying/data gathering/ad serving updated to the latest spying/gathering/ad tech to extract as much data and money as we can.”
(I 100% didn’t read this article and am 100% taking the piss on these shitty companies spying on us and manipulating us)
Oh damn. That’s wild.
Me either! Is it now a dollar general?
Do you live where I live? Exact same scenario, including the fate of the building.
I’m headed in that direction.
No. Your best bet is with something like privacy.com or mysudo.
Edit: grammar