WYGIWYG

  • 0 Posts
  • 385 Comments
Joined 1 year ago
cake
Cake day: September 24th, 2024

help-circle



  • rumba@lemmy.zip
    cake
    toProgrammer Humor@programming.devGitHub auth
    link
    fedilink
    English
    arrow-up
    1
    ·
    6 days ago

    Everybody does it differently. GitHub in particular allows multiple

    If you are doing development or admin work, I would greatly advise you to pick up a Yubi Key.

    My basic setup for any app/site that will allow it is two yubis and one passkey.

    One yubi in the safe with next of kin instructions, one on my key ring.

    Then any site that supports passkey, I’ll also have one of those there too.




  • rumba@lemmy.zip
    cake
    toProgrammer Humor@programming.devGitHub auth
    link
    fedilink
    English
    arrow-up
    3
    ·
    7 days ago

    You can read the cables, you can read the transceivers in the video card, in a lot of the screens you can even read the panel changing itself.

    Our ability is to remote sense EMF is absolutely ridiculous these days.

    Then there’s crap like the espionage where they change fan speeds. Or flash an infrared proximity sensor on a cell phone to exfiltrate data.


  • rumba@lemmy.zip
    cake
    toProgrammer Humor@programming.devGitHub auth
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    7 days ago

    Those are awfully dangerous on their own these days.

    As soon as a poorly salted hash leaks or gasp, a hash with no salt, it’s super easy to reverse those passwords now.

    2FA severely reduces the danger of rainbow tables and keyloggers. The only real worry with 2FA is login replacement and interception. and passkey solves that, allbeit at the cost of complexity.




  • rumba@lemmy.zip
    cake
    toProgrammer Humor@programming.devGitHub auth
    link
    fedilink
    English
    arrow-up
    3
    ·
    7 days ago
    1. password + 2FA AND/OR passkey required.
    • baby steps, start with getting them secure, then when most are ready start dropping the password
    • iron out the kinks, give all apps a chance to implement
    • if you only ever login with passkey and it asks you for 2fa, you can scrutinize the page more

    You can tell just from the response on this post people aren’t all ready for passkey yet, but you can’t wait fo them to decide they’re ready before you start.


  • rumba@lemmy.zip
    cake
    toProgrammer Humor@programming.devGitHub auth
    link
    fedilink
    English
    arrow-up
    8
    ·
    7 days ago

    Under passkey implementations, you need to unlock the passkey device with biometrics or passwords. Something you are/know (biometrics/passwords) and something you have (passkey).

    It’s not impossible to screw it up. Put your passkeys in bitwarden, reuse a password and don’t 2fa that.




  • rumba@lemmy.zip
    cake
    toProgrammer Humor@programming.devGitHub auth
    link
    fedilink
    English
    arrow-up
    11
    ·
    7 days ago

    but they require chmod 400 and they’re ideally in on an encrypted disk

    So the desk drawer is locked and the codes are Luks encrypted.

    And for critical stuff, you should also have a password on the key.

    If your ssh keys are like a passwords on paper in a drawer, you’re doing it wrong.