• 0 Posts
  • 147 Comments
Joined 2 years ago
cake
Cake day: April 3rd, 2024

help-circle
  • The logic behind it is that a smartphone-bound passkey represents two factors of authentication: what you have (the phone) and who you are (the fingerprint used to unlock the phone’s passkey store).

    Anything on a PC is easily copied and can only ever be safely assumed to represent one factor: what you know (the password to unlock your password manager). Thus the benefit of getting a two-factor authentication in one convenient step falls away.

    Of course it’s still super annoying, especially if you don’t really trust your smartphone OS vendor and use a portable password manager already.







  • Jesus_666@lemmy.worldtoProgrammer Humor@programming.devRust Derangement Syndrome
    link
    fedilink
    English
    arrow-up
    23
    arrow-down
    1
    ·
    edit-2
    2 days ago

    Processor architectures maybe. They put Rust into Debian and it’s so bad that now e.g. amd64 is ruined forever for any OS and won’t see any new processors in the future. We’ll have to move to a different architecture. I didn’t watch the video since I treasure my brain cells too much but that’s what I choose to read into it.

    (A more reasonable reading is that Debian now ships a kernel that includes Rust code and coincidentally has also dropped builds for several obscure architectures but I do not feel obliged to assume reason with a title and thumbnail like that.)







  • I mean, I can see a case for not wanting to play dragnet at a mere request. You don’t want any random guy and/or agency to be able to have you to help them track down someone they only have a picture of, no matter how much they pinkie swear they’re doing it to protect that person.

    That’s getting awfully close to sharing PII. You generally want to see a subpoena for this stuff and with good reason. Meta are, oddly enough, not being actively scummy here. (One can of course argue about all the other times when they don’t give a shit; the bigger picture is definitely super scummy. But for this in isolation they actually have a valid reason for their behavior.)

    What might work would be a standardized, streamlined process where the police can ask the company and if the company says the request is reasonable they can apply for an expedited subpoena to allow legal access to the information. Agreement by both would be necessary to give more opportunities for due diligence. This process would also have to have a very limited scope in order to make abuse harder.