• 0 Posts
  • 46 Comments
Joined 11 months ago
cake
Cake day: July 29th, 2023

help-circle


  • It’s probably a bit of both here. We didn’t have the “disposable” lifestyle 50 years ago that we have now, and a stronger push for efficiency and features has had trade-offs in complexity and reliability.

    Example: My current dryer (and my dad’s new dryer) both have a lot more plastic in them. The motors are smaller, and quieter, while making the same power (or more). They are loaded with temp, humidity, weight and wobble sensors, and my dryer has 4 dials, 5 different temperatures, and 2 different modes. The old one, had a dial to control the heat, and a timer.

    As for disposable, I think older generations had an expectancy that you would buy an appliance once or twice in your life. I’ve got a 1000 dollar poket shit-posting device that I’m going to get rid of because it is pushing 4 years old. We just accept that these devices are uneconomical to repair, and we toss them out. I think the only things American’s bother to fix anymore are cars, and that’s going away because every year, they get harder and more expensive to repair.


  • I usually buy Asus for computers, and I go for a mid-range business model with dedicated graphics. They’re cheaper than the gaming counterparts, still have good specs, and they are much more reliable and easy to work on.

    Had a secondhand Alienware, circa 2017, and that thing looked nice, but it was heavy, bulky, and you had to remove the back cover, drives, battery, WiFi antenna, and a bezel just to swap the CMOS battery. But that’s everything Dell IMHO.







  • I can’t really endorse any one over the others. We use LastPass at my workplace, but they were compromised recently. I didn’t use the service though, still reset my passwords just in case.

    I would look for a manager that has a policy of transparency. Breaches happen, they are a fact of life. Both the systems being used, and the people using them are not infallible. I would be more comfortable with a service that notified me immediately when they were breached, and provided easy resolution. When LastPass was breached, they were extremely open about it, and notified their users. Plus, if you use a PW manager, it’s pretty easy to go back in all your services and update the passwords, since you have a list of them and a random PW generator easily accessible. It probably took most people less than an hour to recover.


  • Not bad, but I could see that creating passwords that are too long for some systems, and it would be vulnerable to dictionary attacks. Also, what would you do when the site requires a password reset?

    Maybe do your strat, but only do every other, or every 3rd letter as a short word, and use a Caesar cipher, incrementing the cipher once each time you have to reset? Sounds kinda fun, but I don’t think most sane people would do that… Open to ideas though.



  • For absolutely best security, you would change your password to a new, extremely long, randomly generated character string every time you logged in. What the best security options are, and what users are willing/able to put up with has a very small, if any overlap.

    As for writing them down, my advice is to obfuscate them. Apply your own secret code to the password, hide it in a poem, get creative. Once an attacker is at your desk, they pretty much own your shit. At that level, the only thing your password is providing is privacy, not security.



  • Shitty sites that store PWs in plain text, or they get compromised and the password is figured out from the hash. Probably the most common way right now is phishing, and with AI/LLM it’s pretty easy to do spearphishing attacks on a large scale. The target enters their password on a seemingly legit site, but it’s actually an attacker’s site that logs the PW. There are lots of ways to get a password, and password-only authentication is considered pretty weak, even with a “strong” password.


  • IT, more specifically user support.

    Let’s talk passwords. You should have a different password for every site and service, over 16 character long, without any words, or common misspellings, using capital, lowercase, number and special characters throughout. MyPassword1! is terrible. Q#$bnks)lPoVzz7e? is better. Good luck remembering them all, also change them all every 30 days, so here are my secrets.

    1: write your password down somewhere, and obfuscate it. If an attacker has physical access to your desk, your password probably isn’t going to help much. 2: We honestly don’t expect you to follow those passwords rules. I suggest breaking your passwords down into 3 security zones. First zone, bullshit accounts. Go ahead and share this one. Use it for everything that does not have access to your money or PII (Personally Identifiable Information). Second zone, secure accounts, use this password for your money and PII accounts, only use it on trusted sites.Third, reset accounts. Any account that can reset and unlock your other accounts should have a very strong and unique password, and 2FA.

    Big industry secret, your passwords can get scraped pretty easily today, 2FA is the barest level of actual security you can get. Set it up. I know it’s a pain, but it’s really all we’ve got right now.





  • Simple, if any religion was true and objectively based in reality, why the fuck do they need missionaries to spread it?

    If any religion was true, it would have measurable, verifiable, and predictable traits that would be discovered in isolated societies. If all of mankind’s knowledge was erased, we would eventually rebuild our understandings of physics, biology, chemistry and mathematics as they are today. If all knowledge of religions were erased, we would never get the same religions back.