this post was submitted on 25 May 2025
78 points (97.6% liked)

Technology

71083 readers
3302 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 9 comments
sorted by: hot top controversial new old
[–] satanmat@lemmy.world 5 points 2 weeks ago (1 children)

Kinda cool idea;; but the key can't be rewritten; so if something happens to your phone; it would be bricked.

So... not really that great??

[–] Dlayknee@lemmy.world 2 points 1 week ago

Isn't that arguably the nature of encryption, though? If you lose the key, you're SOL by design.

[–] mspencer712@programming.dev -4 points 2 weeks ago (2 children)

Wait, desoldering a chip and dumping contents makes an attacker “resourceful”? A sub-$50 hot air rework station (or $330-ish if you don’t want one that’ll burn your house down) and a $50 programming cable is … not a lot of resources.

[–] reksas@sopuli.xyz 19 points 2 weeks ago* (last edited 2 weeks ago)

well, isn't security kind of about setting the "filter" for potential attackers? You can break a padlock with hammer, but it will keep out random people from wandering in. Having to rewire and program stuff to access this would keep many types of away. The kind of attacker who would want to go through all that trouble wouldn't be kept away even with more secure methods most likely. Though I guess you could just take the drive and pay someone to deal with it, but still it would need at least some knowledge to even know what should be done with it.

[–] treadful@lemmy.zip 12 points 1 week ago (2 children)

Bro most people can barely heat up pizza rolls in the oven.

[–] mspencer712@programming.dev 2 points 1 week ago (2 children)

I can’t tell if I communicated badly or I’m really just off the mark. But we already encrypt storage at rest, when we have valuable or sensitive data, because of the risk that thieves might read stolen data.

So take that a step farther. A thief can “know a guy” who spent a few hundred on soldering equipment and watched some tutorials on YouTube. We don’t consider sensitive data to be unavailable to thieves just because it isn’t readable via plug and play.

[–] 3abas@lemm.ee 1 points 1 week ago

The opportunity to take you usb drive and copying its content real quick while you are distracted momentarily is eliminated. I can then decrypt it by calling the guy I know.

But I can't call the guy I know with the $50 setup that can extract the data for me in that time. It's not 100% unbreakable, but that doesn't have to be the criteria...

[–] treadful@lemmy.zip 1 points 1 week ago

What does any of that have to do with our pedantic argument about the use of the word "resourceful"?

[–] Eyedust@lemmy.dbzer0.com 2 points 1 week ago

But I like how squishy and soft they are from the microwave...