fireshell

joined 5 months ago
[–] [email protected] 19 points 2 months ago (5 children)

Durov, as a citizen of France, recently sent them away when they asked for access, and then flew to them to test the strength of democracy. Imbecility and courage.

[–] [email protected] -5 points 3 months ago (1 children)

mobile_user.js Mull privacy, security and anti-fingerprinting.

[–] [email protected] 6 points 4 months ago (2 children)

Is there anything there besides a video about Linux with 5 views? Maybe some unique blogs? Or at least reposts of channels from YouTube? Maybe collections of music videos?

[–] [email protected] 6 points 4 months ago (1 children)

openSUSE is already a brand, now the main thing is not to get lost.

[–] [email protected] -4 points 4 months ago

Would break the fingers of the designer who, starting with 115, messed up the layout and removed the ability to keep tabs at the top of the window. Why the hell should I search there? What was the problem with searching in the toolbar?

[–] [email protected] 3 points 4 months ago

Verifying the Security Claim of 2FA Devices

The claim that using OTP tokens and Yubikeys compromises your security and privacy is completely false.

Let's look at this in more detail.

Arguments against concerns:

  1. Limited information:
  • Device serial numbers and purchase details are stored by the retailer, but this does not provide access to your accounts. Serial numbers themselves cannot be used for hacking.
  1. Cryptographic protection:
  • Yubikey and OTP tokens use strong cryptographic methods such as HMAC-SHA1, RSA and ECC, which make OTP generation extremely secure and tamper-resistant.
  1. Physical access:
  • Authentication using these devices requires physical access to the device. This means that an attacker must physically possess your Yubikey or OTP token in order to be authenticated.
  1. No transfer of personal data:
  • These devices do not transmit or store personal user information on third-party servers. They generate one-time codes locally and send them only to the target service.
  1. Phishing protection:
  • Yubikey with FIDO U2F and FIDO2 support protects against phishing because the codes are domain specific and cannot be used on phishing sites.

Additional arguments:

  1. Reducing dependency on passwords:
  • Using 2FA devices reduces the risk of accounts being compromised, even if the primary password is stolen.
  1. Integrated protection systems:
  • When combined with other security measures, such as two-factor authentication with SMS or mobile apps, OTP tokens and Yubikeys create multi-layered protection that makes it harder to hack.
  1. Convenience and speed:
  • These devices simplify the login process by providing instant and secure authentication without the need to remember complex passwords.

Conclusion:

While purchasing a 2FA device may leave traces in merchants' databases, the risks are minimal compared to the security they provide. Yubikey and OTP tokens significantly increase the level of security for your accounts, especially when combined with other security methods. Therefore, the claim that using these devices compromises your security and privacy is untrue.

[–] [email protected] 1 points 4 months ago

Wallabag also has open instances where you can register as a example.

[–] [email protected] -5 points 4 months ago (2 children)

It is noteworthy that builds of Chrome, VLC, Dolphin, Steam and Spotify are created by third-party enthusiasts not associated with the main projects.

What great news, that's why there is no trust in Flathub.

[–] [email protected] 0 points 4 months ago

in general, it was interesting to read, nothing more

view more: ‹ prev next ›