Comment Re: Navy? (Score 1) 74
That is like asking why the navy has planes. Is that not what the Air Force is for?
That is like asking why the navy has planes. Is that not what the Air Force is for?
Kids these days.
Go enlighten yourself by watching Electric Dreams.
Maybe it uses WireGuard instead
Ubuntu mirrors Debian testing, not unstable.
What, do you mean the generous ten-dollar Uber eats gift card did not cover their damages and losses? Unthinkable.
Instead of a video, write down or print the 6 algorithms needed to solve it with the basic method and you can practice without having your phone.
âoe Think of how stupid the average person is and then realize that half the population is stupider than that.â
That would be the median, not the average.
The internet existed before 1995.
Here have a sense of humor, they were on sale at k-mart.
Does Mark get work notifications on his phone? That is a no-no! Disconnect, dude! Only check that crap when you get to your (home) office (which is probably bigger than my entire house).
Wow did you just refer to your kid as âoeitâ?
âoe humorously heavy and bulky older cathode-ray tube (CRT) TVs that used to populate family roomsâ - written like a true millennial who now feels super high tech with their 100-inch flat screen - bet theyâ(TM)ll feel awkward in 20 years when the same comment is made about physical screens and how hilarious they were compared with beaming images direct into the brain. Be humble and recognize technology within its historical context.
You are thinking of John Edward Jones who died in 2009 after falling and getting stuck upside down in Nutty Putty Cave in Utah.
Modern keys support nfc for contactless verification. Also, the phone itself can be used as an authentication device, with the private key residing in the phoneâs TPM and unlocked by biometrics (fingerprint or face scan).
The solution is technically unsound for other reasons but the authentication bits of it actually work almost anywhere nowadays.
Fido2 and webauthn are protocols, nothing in them dictates the device has to be a physical key. Itâ(TM)s possible to implement the entire thing in software which totally nullifies the concept behind this. Iâ(TM)m actually surprised the idiots as cloud flare havenâ(TM)t foreseen this possibility.
I mean, of course the webauthn request can specify it requires a hardware key (which translates to biometrics-unlocked TPM if youâ(TM)re using a mobile device that supports that) but this is enforced by the browser, and given enough motivation someone could modify the browsers code so it ignores that requirement and just returns a signed reply automatically. No human involved
This is a terrible idea but it probably doesnâ(TM)t matter because itâ(TM)s technically wrong so will probably fail on its own.
"An organization dries up if you don't challenge it with growth." -- Mark Shepherd, former President and CEO of Texas Instruments