=== ANCHOR POEM === ════════════════════════════════════════════════════════─────────────────────────── alternatively, when you initiate an SSH session it sends you a randomized public key whose private key is the password that you need to login. By decrypting the string of text it sent you and sending it back (plus the password at the end or whatever) you can ensure secure authentication without bothering with the passwordless keys which are wayyyyyy more trouble than they're worth and lack the "something you know" authentication method. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ === SIMILARITY RANKED === --- #1 fediverse/3469 --- ════════════════════════════════════════════════════════─────────────────────────── you know how SSH password login is deprecated because the password needs to be transmitted in cleartext or whatever? what if we just... required two passwords? the first initiates the conversation, and sets up an encrypted line. It doesn't matter if anyone sees the first password because they'll get a new set of encrypted keys, meaning each session automatically is encrypted in a different, randomized way. the second password is the one that actually authenticates you. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #2 fediverse/2674 --- ══════════════════════════════════════════════════════───────────────────────────── ┌────────────────────────────────────────────────────────────────────┐ │ CW: factually-untrue,-that-never-happened.-this-is-just-gesturing. │ └────────────────────────────────────────────────────────────────────┘ the kind of friendship where you SSH into each other's systems and leave notes for one another. as soon as you find one you message the person who left it like "yoooo only just found this lol" and they're like oooo yeah did you see the bash script I wrote in that directory "yeah totally I used it on one of my video files just now - cool filter!" ahhhh reminds me of all the times hackers have hacked my permanently insecure system and left me friendly messages like "hey I'm on your side" or "how's life, friend? I hope it's going well." or "never forget; you are worth all the fear" y'know cute things like that oh. right. because leaving vulnerabilities like that can lead to threat actors affecting your stuff. how lame. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘ --- #3 fediverse/3471 --- ════════════════════════════════════════════════════════─────────────────────────── @user-883 it might be, I don't know much about it (hence why I'm asking questions) but I have heard that ssh keys are more secure than password authentication and it never made sense to me. If availability is important for security purposes, then wouldn't SSH keys (which are much more difficult to carry around than a password) be less suitable? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #4 fediverse/5109 --- ═══════════════════════════════════════════════════════════════════──────────────── does anyone know of a website where I can host videos on my neocities that isn't youtube? maybe something I can set up on my own server computer at home like a file server or something? how do I do that, what should I google, which is the easiest and closest to the metal tools I can use? [practical, sensible, courageous. these are the adjectives we need.] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════════════───────────────┘ --- #5 fediverse/1310 --- ════════════════════════════════════════════════─────────────────────────────────── that feeling when you type your password so fast that one hand is faster than the other and the letters get all jumbled and now you have to remake your ssh key -.- ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘ --- #6 fediverse/2200 --- ═════════════════════════════════════════════════════────────────────────────────── I love D&D books with lots and lots of randomized tables because you can, in a pinch, use them as code-books for encrypting text using a method that nobody will ever guess. Well, as long as you have two of them, one to give to your friend and one to keep yourself. This is a form of "symmetric encryption", where you each have a copy of the input/output tables. More secure is the private/public key style encryption, but good luck explaining that to a 14 year old. Plus you can't do it over a radio, you need a computer. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧══════════════════════════════════════════════─────────────────────────────┘ --- #7 messages/181 --- ══════════════════════════════════════════════───────────────────────────────────── I know you don't want to hear this, but there is a chance that there will come a time where your life depends on your ability to debug a computer without the internet. To set up an SSH server. To install Linux. To program in C. To do something else that I'm not prepared for... If StackOverflow didn't exist because network connectivity has been lost, could you remember syntax? Maybe it's a good idea to set up a local LLM that can answer basic questions about technology. Maybe it's a good idea to set up on your parents computer, just in case you have to hide out there for a couple months. Maybe it's a good idea to download wikipedia, just in case. If I need to use a mac, I'm screwed ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘ --- #8 fediverse/1038 --- ═══════════════════════════════════════════════──────────────────────────────────── ┌──────────────────────┐ │ CW: re: what │ └──────────────────────┘ @user-766 ah yes but then how will my comrades come for my things know where to look? my precious precious drives may be less safe inside of the computer case but at least then someone I can about can find them. or what you're saying is that a basic part of situational awareness is having a plan for this kind of thing with the people who care about you? Ah, well, nobody cares about me like that. Just a couple normies who want nothing but business as usual. wonder if I can open up my hard drives to "read only" SSH access? Or maybe I'll just make the important files into a torrent. Or perhaps marking them as "downloadable locations" on Soulseek? Plenty of options, all of them require someone to care enough about your junk to want to archive it. Something something ipfs? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════───────────────────────────────────┘ --- #9 fediverse/4107 --- ═══════════════════════════════════════════════════════════──────────────────────── Just configured Wake on LAN so I can turn on my desktop from anywhere. As long as I have the right SSH key... Couldn't figure out how to do Wake on WAN, which I think is somehow more secure. This way uses a small jump from a separate tiny computer which is always on. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════───────────────────────┘ --- #10 fediverse/3234 --- ╔═══════════════════════════════════════════════════════───────────────────────────┐ ║ ┌────────────────────────────────────────────────────────────────┐ │ ║ │ CW: ritz-is-fucking-stupid-I-guess-oh-whoops-cursing-mentioned │ │ ║ └────────────────────────────────────────────────────────────────┘ │ ║ │ ║ │ ║ my understanding is that anyone with my IP address could make my heart bleed │ ║ due to a hardware vulnerability on my motherboard. Though you might have to │ ║ get past my decrepit ancient linksys EA 3500 router from 2012 first. │ ║ │ ║ unrelated, but does anyone want my IP address? I don't have any remote │ ║ backups, so if you hate me now would be a great time to show me how despised I │ ║ am. Alternatively you could try searching for anything evil to ensure that I │ ║ can be trusted. You're gonna find mostly video games and source-code that I │ ║ didn't write though. But also all my notes in directories that are │ ║ non-standard, meaning you'll have to look around a bit. I leave little notes │ ║ everywhere I go, so that I can remind myself how to do things in the │ ║ directories I revisit months later. It's so weird how sometimes the things I │ ║ wrote stop working after a while even if I didn't update my system lmao │ ║ │ ║ what is it with artists and self-immolation? "I never thought I'd actually di │ ╟─────────┐ ┌───────────┤ ║ similar │ chronological │ different │ ╚═════════╧════════════════════════════════════════════────────────────┴──────────┘ --- #11 fediverse/874 --- ══════════════════════════════════════════════───────────────────────────────────── oh yeah well if SSH keys are so secure then why doesn't every website on Earth require them really though why doesn't every website on Earth require them ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘ --- #12 fediverse/5950 --- ══════════════════════════════════════════════════════════════════════════───────── @user-138 wao I'm a cool kid _^ Hmmmm I googled "Network: file exists" and got this link: https://access.redhat.com/solutions/1340713 my understanding of that is that maybe you're creating static routes, and for some reason you're trying to create one that already exists? Maybe there's something in your .bashrc config, if the file appears when you open a terminal, or perhaps if it appears randomly then maybe there's a service or something that's doing it. Did you say it stopped when you swapped sim cards? ... on your phone? that's bizzare... Maybe you were trying to create an ip route (whatever that is) that was pointing to the same ip address as your phone? and when you swapped sims it changed the ip address? If it appears again, maybe try setting static IP addresses for both the phone and the computer in your router settings and see if that fixes it. Though if you've ever seen the error while out and about at like, a coffee shop or library or whatever, then that wouldn't apply since the router is only for home base... ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘ --- #13 fediverse/2056 --- ╔═════════════════════════════════════════════════════─────────────────────────────┐ ║ sometimes I think about how you can store number values in letters, in │ ║ addition to numbers. Like, ascii values for each word of your grandma's maiden │ ║ name. All you have to do is encode it, and suddenly "44 means something │ ║ different than Q" │ ║ │ ║ if I showed up at your place and used your username as a password to a public │ ║ key I'm showing you in my hand, would you trust me then? Would you trust if we │ ║ ran the simulation on your computer versus mine? Would you trust if I had │ ║ never told you I knew where you lived? │ ║ │ ║ ... probably, tbh, I'm desperate for adventure. Though I got some good things │ ║ going for me, so you'll have to convince me. (not the right attitude in an │ ║ election year, just saying) │ ║ │ ║ why are elections so perilous this is NOT what democracy is designed for │ ║ │ ║ when kids cry in preschool, they're sent to a different room (or put outside) │ ║ until they stop making noise and ruining it for others. That's just natural, │ ║ like "hey baby let's walk around the block while I bounce you on my shoulder │ ║ and hum calming music to │ ╟─────────┐ ┌───────────┤ ║ similar │ chronological │ different │ ╚═════════╧══════════════════════════════════════════──────────────────┴──────────┘ --- #14 fediverse/4946 --- ════════════════════════════════════════════════════════════════─────────────────── I would trust the CIA if they gave me continual access to all surveillance of myself -- stack overflow -- what if you made a program which cycled credentials? like... "give me a random credential for Zoom" because we share all of our digital resources did you get banned for account sharing? no you didn't because you routed through the correct VPN automagically [has never had a software job] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════════════──────────────────┘ --- #15 fediverse/3668 --- ════════════════════════════════════════════════════════─────────────────────────── setting up an SSH server is like a rite of passage for Linux administrators (notice I didn't say users, you can't use linux, only administer it) ... I'm having trouble with my rites >.> ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #16 fediverse/4301 --- ═══════════════════════════════════════════════════════════──────────────────────── @user-1655 maybe the user could tell their client what fields to expect and how to present them (like, a field called "memes" would be presented as a picture in this panel, a field called "rants" would be passed to a word-cloud function that extracts the most common 6+ letter words so you can tell at a glance what the rant is about, this other field could be for calendar invites (plain text of course, but interpreted by the calendar program) etc) plus, if it's encrypted with PGP keys by default, there'd be few security concerns. Unless your friend got hacked, or you got hacked, but, well... make sure everything's sandboxed and don't do any remote code execution and you're good, right? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════───────────────────────┘ --- #17 fediverse/2622 --- ══════════════════════════════════════════════════════───────────────────────────── what kind of linux user are you if you don't even like reading terminal output? it's USEFUL and INTERESTING information! WHY ELSE WOULD THE PROGRAMMER OUTPUT IT??? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘ --- #18 fediverse/5919 --- ══════════════════════════════════════════════════════════════════════════───────── "but... why?" portable linux with buttons, great for pick-up-games or communication, can throw several in them in a backpack if you want clustered cooperation, they work as radios (if the signal reaches) and can transmit text (if you use a radial-style keyboard) [this is all just a pitch for... something, what, you want something? ha you'll find no things with me, I know nothing of antifa or whatever] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘ --- #19 fediverse/3751 --- ════════════════════════════════════════════════════════─────────────────────────── I wonder if anyone would pay me to write bash scripts for them? is there a role that's just... bash scripter? is that what sysadmins do all day? or is that more automation? and what the heck is a dev op? do they write bash scripts? or maybe writing bash scripts is the "fun" part of linux, and nobody would pay anyone else to do it because they want to do it themselves ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #20 fediverse/1611 --- ╔═══════════════════════════════════════════════════───────────────────────────────┐ ║ @user-1040 │ ║ │ ║ well, usually in the examples I shared like tumblr posts there's a username │ ║ and picture shown. But tumblr users change their names, while on Mastodon (at │ ║ least on my client) it shows your permanent handle underneath your regular │ ║ changable name. I guess you could migrate accounts to another server if you're │ ║ being harassed in one place, but still people have a way of finding you. It's │ ║ weird kinda makes me wonder if they track you by ip address haha - did you │ ║ know that every computer attached to a router uses the same public IP address? │ ║ Then it uses either DHCP or static assigned local addresses for every computer │ ║ on the network. That's pretty neat! I wonder why we don't have workstations by │ ║ default include a router (and modem)? Seems like pretty important tech that │ ║ should be built into the chassis instead of in a small separate unit. Like, │ ║ what if you had to throw all your belongings into a van and drive to a motel │ ║ somewhere to set up your workstation in a hotel because it's hot and your ac │ ║ broke lol │ ╟─────────┐ ┌───────────┤ ║ similar │ chronological │ different │ ╚═════════╧════════════════════════════════════════────────────────────┴──────────┘ |