I am a Meat-Popsicle

  • 33 Posts
  • 803 Comments
Joined 2 years ago
cake
Cake day: June 10th, 2023

help-circle
  • It’s a bit of math, split into two pieces.

    You hand out one piece, that’s the public key. It’s tiny and simple.

    You keep the other piece, that’s the private key. It’s long and complex.

    The public key can scramble data that only the large piece can unscramble.

    The private key can create a piece of data that only the public key can verify.

    In practice, these keys can be kept in a database or a file, and they can be held in a hardware security key (yubi/fido). They can be stored on your phone, in Bitwarden, and just about anywhere that keeps passwords, they’re really just a few thousand bytes of data.

    In many cases, You can store them in your phone’s private password storage, then when you log into a website, it will trigger a popup on your phone to authorize your login, so you don’t even have to keep them on the computer you’re using to access the secured site. Most of the implementations require you to have a biometric component. You need to face scan, fingerprint scan, or, worst case, use a password to unlock/verify the passkey on the device.

    The upside here is that the keys are unique to every site. The public key is completely safe to hand out to everyone, it can’t be reverse engineered. This means that websites can’t leak your login credentials in any meaningful way. edit: Also since you’re using math to change a piece of data, it’s impervious to a replay attack and the communication even unencrypted would be reasonably safe even if someone was actively reading it.

    As far as storing for loss, I’d consider regenerating them. I prefer using a password manager that stores them, that way my phone/computers all have access to the same keys.


  • Back when reddit* was just starting to fall to shit, I had already been dipping my toes in the mastodon water, and while I really liked the instance I was on it did not have enough people on it to properly surface good collections of off node traffic.

    Knowing that Mastodon had the problem, I didn’t dick around with smaller nodes. To be honest it’s still a fight if you’re on a node with only a handful of people, you have to do something to mitigate the lack of community traffic in the face of lacking discoverability.




  • So many f****** ads I gave my cell phone cancer.

    TMA:DR

    When taking the geometric mean of 73 benchmarks run for this comparison, upgrading from the Ryzen 9 7950X to 9950X on Ubuntu 24.04 LTS yielded a 14% generational improvement with this set of cross-platform applications/benchmarks while under Windows 11 was a 10% generational improvement. The raw performance of Ubuntu Linux on the AMD Ryzen processors also was greater overall to the extent of the Ryzen 9 7950X to Ubuntu 24.04 LTS nearly matching the Ryzen 9 9950X on Microsoft Windows 11.






  • In theory, it works that way.

    In practice, we’ve never openly stopped anyone with those systems.

    When it comes time for them to justify the invasion of privacy, they don’t have any school shooters stopped, and they don’t have any Unabombers stopped. They don’t have any cases of stolen kids stopped. They’d be shouting all that from the rooftops to expand and extend that funding.

    If they have actually stopped anyone, it’s at super-secret spy game levels. The guys you’re expecting them to stop aren’t even a concern for them. Worse yet, they may actually be rooting for them.



  • Yeah, My volt battery is in the floor of the trunk. If the battery on the volt dies you can’t open the trunk easily. Physical locks in the doors are no problem but they didn’t put a keyhole on the damn trunk.

    You can pop the hood and access the jump terminals and then pop the trunk. You can also crawl into the back hatch from inside pull a panel off and pop the trunk.