What exactly are you looking for? Android IS Linux, do you want to try a different “distribution” just for fun?
Admin of lm.put.tf, there isn’t anything special there, just an instance for friends.
What exactly are you looking for? Android IS Linux, do you want to try a different “distribution” just for fun?
The code is still accessible, you just can’t use the code search function in the web, which normal git doesn’t have anyway.
I guess that noble education is finally paying off, sort of… The only other noble one we know that wants to take another duchy is Georgine 🙃
I gotta admit, it’s kinda funny how Rozenmyne perceived Ferdinand’s Last Will as, “I MUST GO SAVE HIM,” while the letter he sent through Justus was basically the opposite, “DON’T DO ANYTHING, YOU FOOL”.
The latest pixel devices (since 6 I think?) already provide accees to a /dev/kvm
device, so maybe you could even run a normal Ubuntu server VM on your phone for hosting these services.
Are you sure the content is gone? I assume the communities had users from other servers, if so isn’t the content replicated on other servers?
I guess he means that raspberry pi doesn’t run a mainline kernel
deleted by creator
I’m probably obsessing over nothing, but the illustration showing Tuuli’s reaction when her sister said “Tuuli… No matter what happens, I will protect you.” was so good! This will probably sound pretty stupid, only now that we had this illustration did I realise how much Rozemyne grew, I was quite shocked.
That’s a fair point. I just wanted to highlight that there may be cases where a password manager isn’t automatically protected by 2FA by the two factors you mentioned (The password you know and the copy of the vault) since in the case of bitwarden fulfilling one can give you the second. In order to actually achieve 2FA in this case, you would need to enable OTPs.
Many password managers use a biometric factor to sign in
The only thing this does is replace the authentication mechanism used to unlock the vault, instead of using your master password (something you know), it uses some biometric factor (something you are), although it uses your biometric data, it’s still a single factor of authentication
This basically moves the MFA aspect to one service (your password manager) instead of having each service do their own thing
I am not sure I understood you here. What do you mean by “instead of having each service do their own thing”? Each website using their own method of delivering OTPs?
It also comes with the benefits of password managers - each password can be unique, high entropy, and locked behind MFA.
I am not discrediting password managers, they have their uses, as you mention you can have unique, high entropy password on a per service basis. The only thing I am against is the password managers themselves also doubling as OTPs generators (take a look at Bitwarden Authenticator which kinda defeats the purpose of OTPs. From the perspective of OTPs it makes much more sense to use a separate application (Like Google Authenticator or Aegis Authenticator), preferably on a separate device, to generate the OTPs.
That’s not quite right though, there’s the factor you know (password to your vault), and the factor you have (a copy of the encrypted vault).
That would be true for offline vaults, but for services hosted on internet I don’t think so. Assuming the victim does not use 2FA on their Bitwarden account, all an attacker needs is the victim’s credentials (email and password). Once you present the factor you know, the vault is automatically downloaded from their services.
This is something I hadn’t thought until know, but I guess password managers might(?) change the factor type from something you know (the password in your head) to something you have (the vault). At which point, if you have 2FA enabled on other services, you are authenticating with 2 things you have, the vault and your phone.
Although it’s true that you are increasing the attack surface when compared to locally stored OTP keys, in the context of OTPs, it doesn’t matter. It still is doing it’s job as the second factor of authentication. The password is something you know, and the OTP is something you have (your phone/SIM card).
I would argue it is much worse what 1Password and Bitwarden (and maybe others?) allows the users to do. Which is to have the both the password and the OTP generator inside the same vault. For all intents and purposes this becomes a single factor as both are now something you know (the password to your vault).
Any chance to get a guarantee on lm.put.tf ? The instance is only used by people I know to avoid trigger happy admins on larger instances that defederate for trivial reasons. There are no real “communities” there and currently there’s only 5 users with just 2 being active on the fediverse. The admin account there goes largely unused to prevent the instance from being compromised due to XSS and/or CSRF attacks,
There is only one community for meta discussions about the instance so that other people may publicly raise issues to be discussed. Unsurprisingly, no one has posted there yet.
I wonder in what bizarre way, Rozemyne will extract the knowledge from Ferdinand. (I guess by printing some books)
My hypothesis is that Ferdinand was already planning to transfer/write his 30-40% knowledge of the G-book onto the 300 pages of “maximum quality fey paper” that he request from Rozemyne. Maybe he is already expecting to be executed by either the Royal famaly or Georgine/Detlinde and wants to preserve this knowledge somehow.
I ran GrapheneOS on a pixel 5 but ultimately went back to stock.
GrapheneOS was considerably slower on my phone. Apps took a bit longer to loader, but the worst was installing APKs, it takes so much longer compared to stock. Some apps (e.g. revolut) took more than 5 minutes to install, it was crazy.
Wouldn’t unlocking the bootloader and installing a custom ROM be easier, more stable and cheaper than buying a niche product that’s unlikely to work properly?