=== ANCHOR POEM === ════════════════════════════════════════════════════─────────────────────────────── "if I work on the TTY then they can't forward my X session without my consent" - ramblings of the utterly deranged as if they couldn't just look at your unencrypted source-code as you save it to your hard drive smh ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════──────────────────────────────┘ === SIMILARITY RANKED === --- #1 fediverse/2252 --- ══════════════════════════════════════════════════════───────────────────────────── ┌──────────────────────┐ │ CW: tech-encryption │ └──────────────────────┘ users don't want to have to think about encryption keys. they should be available for them if they need them, in like... a folder or something somewhere, but they don't need to really know that they exist. more friction like that keeps people away from being secure. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘ --- #2 messages/635 --- ════════════════════════════════════════════════════════════─────────────────────── Yeah, sure, signal is encrypted, but they could just put a virus on your miniature pocket tv that streams your screen into a text recognition bot which streams that text into an LLM trained to report on suspicious seditious activity. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════════──────────────────────┘ --- #3 fediverse/1310 --- ════════════════════════════════════════════════─────────────────────────────────── that feeling when you type your password so fast that one hand is faster than the other and the letters get all jumbled and now you have to remake your ssh key -.- ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘ --- #4 fediverse/874 --- ══════════════════════════════════════════════───────────────────────────────────── oh yeah well if SSH keys are so secure then why doesn't every website on Earth require them really though why doesn't every website on Earth require them ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘ --- #5 fediverse/664 --- ═════════════════════════════════════════════────────────────────────────────────── @user-482 [secretly installs a keylogger and doesn't tell anyone upstream but still pushes it to production] [or worse, was told to do as such and given tools to fabricate "evidence" to the contrary to everyone else on the team] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧══════════════════════════════════════─────────────────────────────────────┘ --- #6 fediverse/612 --- ═════════════════════════════════════════════────────────────────────────────────── Look all I'm saying is if I had an acolyte or two then my insane ramblings could be filtered and parsed by a real actual human instead of being copied wholesale onto the internet, where the inconsequential or inconceivable ones are left to rest alongside the gifts of knowledge from another realm. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧══════════════════════════════════════─────────────────────────────────────┘ --- #7 fediverse/1246 --- ═══════════════════════════════════════════════──────────────────────────────────── @user-883 hehe if I don't understand how it works it's difficult for me to use things. My Linux friends get so exasperated with me because I'm like "cool script gimme like 2 days to figure it out" and they're like "bro just use these flags" and I'm like "no" ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════───────────────────────────────────┘ --- #8 fediverse/3470 --- ════════════════════════════════════════════════════════─────────────────────────── alternatively, when you initiate an SSH session it sends you a randomized public key whose private key is the password that you need to login. By decrypting the string of text it sent you and sending it back (plus the password at the end or whatever) you can ensure secure authentication without bothering with the passwordless keys which are wayyyyyy more trouble than they're worth and lack the "something you know" authentication method. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #9 fediverse/5919 --- ══════════════════════════════════════════════════════════════════════════───────── "but... why?" portable linux with buttons, great for pick-up-games or communication, can throw several in them in a backpack if you want clustered cooperation, they work as radios (if the signal reaches) and can transmit text (if you use a radial-style keyboard) [this is all just a pitch for... something, what, you want something? ha you'll find no things with me, I know nothing of antifa or whatever] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘ --- #10 fediverse/1221 --- ═══════════════════════════════════════════════──────────────────────────────────── @user-883 either that or I might get lost in some C code we'll see how things develop >.> ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════───────────────────────────────────┘ --- #11 fediverse/1064 --- ═══════════════════════════════════════════════──────────────────────────────────── ┌──────────────────────┐ │ CW: politics │ └──────────────────────┘ @user-68 "if California isn't America then neither is Texas" sounds much different than "If Texas isn't America anymore then neither is California////" ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════───────────────────────────────────┘ --- #12 fediverse/3469 --- ════════════════════════════════════════════════════════─────────────────────────── you know how SSH password login is deprecated because the password needs to be transmitted in cleartext or whatever? what if we just... required two passwords? the first initiates the conversation, and sets up an encrypted line. It doesn't matter if anyone sees the first password because they'll get a new set of encrypted keys, meaning each session automatically is encrypted in a different, randomized way. the second password is the one that actually authenticates you. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #13 fediverse/4946 --- ════════════════════════════════════════════════════════════════─────────────────── I would trust the CIA if they gave me continual access to all surveillance of myself -- stack overflow -- what if you made a program which cycled credentials? like... "give me a random credential for Zoom" because we share all of our digital resources did you get banned for account sharing? no you didn't because you routed through the correct VPN automagically [has never had a software job] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════════════──────────────────┘ --- #14 fediverse/6209 --- ════════════════════════════════════════════════════════════════════════════─────── okay just to clarify: if anyone is recording me or storing data about me, I would really prefer if you didn't delete it just because I realized it was happening. I like data! It's cool to know such things! ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════════════════════════──────┘ --- #15 fediverse/5961 --- ══════════════════════════════════════════════════════════════════════════───────── @user-138 maybe it's evil hackers - idk that's beyond my expertise - good luck : ) (I'd need to see the piece of technology to work on it. I'm a hardware kinda [girl, but pronounced guy]) ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘ --- #16 fediverse/581 --- ═════════════════════════════════════════════────────────────────────────────────── @user-428 sometimes I think about how much more productive I'd be if I had a code editor that let me draw arrows and smiley faces and such alongside the code. Or if I could position things strangely, like two functions side-by-side with boxes drawn around them. Or diagrams or flowcharts or graphs or... something that would output to raw txt format, but would present itself as an image that could be edited. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧══════════════════════════════════════─────────────────────────────────────┘ --- #17 messages/1488 --- ══════════════════════════════════════════════════════════════════════════════════─ "what are you doing?" doxxing myself. If she wanted to save as many lives as possible, she'd do it in a shed. She's been tricked into doing it for the money by people who don't want to die in a warehouse. That's valid, but they aren't giving her money anyway. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════════════┘ --- #18 fediverse/6437 --- ══════════════════════════════════════════════════════════════════════════════───── if I was writing a programming language, I'd name it C just to fuck with people (great, now others can decide how it's known) ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════════────┘ --- #19 fediverse/3471 --- ════════════════════════════════════════════════════════─────────────────────────── @user-883 it might be, I don't know much about it (hence why I'm asking questions) but I have heard that ssh keys are more secure than password authentication and it never made sense to me. If availability is important for security purposes, then wouldn't SSH keys (which are much more difficult to carry around than a password) be less suitable? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #20 fediverse/2307 --- ══════════════════════════════════════════════════════───────────────────────────── "If you can't find it, you don't have it" ugh I know, me-from-the-past, now shut up and tell me where my USB-C cable is. I have like 4 how did I hide them so good when packing ? ? ? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘ |