![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/41e39366-cb91-4d4a-bc07-a47621cb7d5f.jpeg)
How about Arabic? Or Chinese, simplified Chinese is read by like a billion people, so clearly easily readable, it even has simplified in the name!
How about Arabic? Or Chinese, simplified Chinese is read by like a billion people, so clearly easily readable, it even has simplified in the name!
Are you perhaps an LLM in disguise?
Ill let it slide, because you seam to have made it youre hole identity, butt ill note its knot relevant to this discussion
Worst thing? Someone with access to your password can now break into the associated account, and use that access to snoop or potentially permanently lock you out. E2EE data could be lost forever if they change the password and 2FA.
More likely? Unless you reuse passwords, or the associated site has been recently compromised, pretty low odds of compromise. If you suspect your 2FA has leaked, just get a new secret, easy peasy. Most reputable sites should alert you to a login on a new device, potentially giving you time to react or alerting you of snooping.
If your secret leaks without context on what site it’s associated with, then unless your name is Taylor Swift, odds of someone associating it to a site, let alone the matching password, are astronomical.
for reasons I don’t completely understand, Resilio Sync connections seem to be quicker and more reliable
Resilio runs a “relay” server to facilitate connections where neither peer has properly set up port forwarding. Only downside of Resilio is its not open source, so you just kinda have to take their privacy policy at face value. As long as op isn’t sending something super sensitive though, it probably is no big deal.
Lemmy and snarky references back to Reddit like that ex-girlfriend you’ve “totally moved on from”
You running the Trump campaign in your spare time?
Definitely no, viruses need 48-72 hours of incubation before the .mkv host becomes contagious. If the file is <24 hours old, I’d look for another source.
If you’re worried your computer might be infected, you should consider swapping your case LEDs with UV lights to purify your system.
I mean look you could just not use Visa right? We all have tons of other options, and they’re totally not a monopoly right? That’s why we’re not regulating them, right?
If you can’t enter a kill code and have your phone self destruct into a million pieces, can your life even be considered private?
How else will she know Vigo broke his foot?
capture the generated codes and time of input in some way, then brute force hashes until they generate one that produces the correct codes at x time
Given a TOTP key is usually at least 18 characters for a 6-digit code, having only one data point sticks you with something on the order of 10^28 possible keys for a given singular code (way more if case sensitive). You’d need to be regularly intercepting TOTP codes to brute force your way to the right key, and even then it’d only be valid for a single site. At that point it probably means you’ve fully compromised the connecting device or server, at which point, why do you even need the TOTP again?
Reel Big Fish - Another F.U. Song
https://m.youtube.com/watch?v=LQ9YVF-wyho