• 0 Posts
  • 219 Comments
Joined 1 year ago
cake
Cake day: June 29th, 2023

help-circle

  • They were pretty astonished when they heard that she had installed a GPU by herself (which most people here know is trivial). Which gave her enough confidence to fix her VCR by herself.

    Anyone can learn any skill if they actually invest the time.

    And regarding the older brother, you learn pretty quickly working help desk that users generally don’t care what the problem is or why it happened. They just want to get back to work and not have it happen again. After a while you get conditioned to just be friendly and solve the issue without explaining what you’re doing or why.


  • Ultimately, in terms of security, you’re likely to find that both are similarly good.

    What makes Firefox desirable over Chrome is that it’s not beng developed by massive corporation that gets the majority of its profits selling user data and delivering targeted adverts.

    The other thing that may act as a deciding factor is the “MacOS doesn’t have viruses” effect. Wherein that because firefox has such a small userbase in comparison to chromium, it’s far more profitable to find exploits in chromium.




  • Godort@lemm.eetoMemes@lemmy.mlWhat’s stage 4?
    link
    fedilink
    arrow-up
    9
    ·
    28 days ago

    This makes perfect sense to me.

    At the start of your career, you want to be important enough that people will care about your opinions, which means getting invited to meetings where things are discussed.

    Stage 2, you’ve been there long enough and know how things work so you can offer input and help make decisions.

    Stage 3 is the point at which people will come to you for input outside of meetings because that’s easier. You just want to do your job and generally don’t care about decisions anymore unless they bring sweeping changes.














  • I’m not sure I necessarily agree. Your assessment is correct, but I don’t really think this situation is security by obscurity. Like most things in computer security, you have to weight the pros and cons to each approach.

    Yubico used components that all passed Common Criteria certification and built their product in a read-only configuration to prevent any potential shenanigans with vulnerable firmware updates. This approach almost entirely protects them from supply-chain attacks like what happened with ZX a few months back.

    To exploit this vulnerability you need physical access to the device, a ton of expensive equipment, and an incredibly deep knowledge in digital cryptography. This is effectively a non-issue for your average Yubikey user. The people this does affect will be retiring and replacing their Yubikeys with the newest models ASAP.