As you wish. But maybe open up to some new perspectives.
As you wish. But maybe open up to some new perspectives.
What does a healthy opinion of F-Droid look like though? Lol
4 days later dude. Eric Berger is inspiring the next generation of haters.
Well, then its still 2FA. Something you are and something you have.
The website has to build in support for them. Youll start seeing it more over time.
To be fair, you cant use the passkeys unless you are logged into your password manager, which requires a password you “know”.
Im not disagreeing, but there is a noticeable lack of hate towards other space programs. Ive been reading his stuff for a long time now, and man oh man, does Boeing have a special place in his heart.
Maybe the other commercial space programs are doing better, or MAYBE they’re being underreported on.
All of life’s certainties:
Dude has been at it since hes been at Ars lol. Not just “lately”
Eric Berger wrote this
This blog is specifically for websites that are public facing. Sure, you can wireguard into your local network, but you can also SSH into your local network. Either way you have to poke a hole.
Good read.
I would just like to add some additional information that favors changing your SSH port to something other than the default. When crawlers are going around the internet looking for vulnerable SSH servers, they’re more than likely going to have an IP range and specifically look for port 22.
Now can they go through and scan your IP and all of its ports to look for the SSH service? Yes. But you will statistically have less interactions with bad actors this way since they might specifically be looking for port 22.
Thank god Eric Berger from Ars Technica didn’t write this article lol. Glad to see this progress, even if Eric probably doesn’t. Cant wait to see this baby in action next year 🙂
Yes, verified boot will have out-of-bands alerts for you by design. Without the online component, you will risk not being able to detect tampering.
If the hardware is tampered, it will not pass the attestation test, which is an online component. It will fail immediately and you will be alerted. Thats the part of verified boot that makes this so much harder for adversaries. They would have to compromise both systems. The attestation system is going to be heavily guarded.
Compromised hardware doesn’t know the signatures. Math.
If the hardware signatures don’t match, it wont boot without giving a warning. If the TPM/Secure Enclave is replaced/removed/modified, it will not boot without giving a warning.
I don’t think ive heard about any privacy issues regarding modems. They convert your data into the Level 1 format so that it can be moved to the next hop. There isn’t really anything to spy on, and its very hardware dependent (hence no open source software that can standardize across each device). There might be open source modems out there, but your ISP probably doesn’t support them.