bdjegifjdvw@lemmy.world to Programmer Humor@programming.dev · 7 days agoI love password based loginlemmy.worldimagemessage-square197linkfedilinkarrow-up11.34Karrow-down124
arrow-up11.32Karrow-down1imageI love password based loginlemmy.worldbdjegifjdvw@lemmy.world to Programmer Humor@programming.dev · 7 days agomessage-square197linkfedilink
minus-squareGt5@lemmy.ziplinkfedilinkarrow-up2·6 days agoYes, buts it’s not something that can be easily guessed or found on a post it on the monitor
minus-squareBCsven@lemmy.calinkfedilinkarrow-up2·6 days agoTrue dat. But if they compromise your computer the first thing the look for is key files. Like my ssh keys are in a root permission file. Protected from general sight, but if somebody compromises my PC with a CVE on then goodbye keys. At least with hardware key it is removable and requires a button press. So accessing becomes physical access or quantum computer cracking
Yes, buts it’s not something that can be easily guessed or found on a post it on the monitor
True dat. But if they compromise your computer the first thing the look for is key files.
Like my ssh keys are in a root permission file. Protected from general sight, but if somebody compromises my PC with a CVE on then goodbye keys.
At least with hardware key it is removable and requires a button press.
So accessing becomes physical access or quantum computer cracking