asmoranomar

joined 2 years ago
[–] asmoranomar@lemmy.world 1 points 1 month ago (1 children)

Keep in mind, still discussing the underlying fundamentals and not the user experience.

MitM attacks are frequently covered in white hat hacking, often after an actual event takes place. It is considered a third party attack, and it does break trust. It is a security threat, and to claim it doesn't count is absurd. I've seen a few reports personally from internal, but I'm not at liberty to speak specifics about them. On the topic of replay attacks, TOTP is vulnerable, but passkeys are not (yet, I've seen people try though). This isn't the only type of MitM attack, and, again, both are somewhat vulnerable.

TOTP is nothing, nowhere similar to passkeys in any way. You do NOT generate codes with passkeys. Passkeys are a form of public/private keys that are used to create a challenge/response request and used to generate a digital signature. The keys are not passwords (aka "shared secrets"). Digital signatures are also not passwords. The only other thing I can think you mean by "code generation" is that you're using it as a generic catch-all, but that happens with....well everything (even passwords), depending on context.

I don't want to sound too much like a die hard passkey fan - and you are right - passkeys are extremely overkill if you use anything above a plain old password. In some cases, layered security can be just as effective. The problem is that most people do only use plain old passwords. If we can get any kind of extra security, even TOTP, then all the better. There are also some cases passkeys are not feasible, so it's good to have alternatives.

[–] asmoranomar@lemmy.world 2 points 1 month ago (3 children)

That's false, TOTP can and has been the target of man in the middle attacks, successfully. The implementation of passkeys makes man in middle attacks more difficult, but it could still happen. So both are susceptible to third parties to some degree.

As far as point of view, I was assuming we were talking about the process, since the goal of passkey UX is to be largely the 'same as'. Which, to be frank, is way less dedicated since both the implementation of passwords and passkeys can vary widely (2fa, email, id, otp, etc). If we exclude those, the UX is the same - some users might be even using passkeys and not know it.

[–] asmoranomar@lemmy.world 1 points 1 month ago (5 children)

TOTP is based on shared secrets, just like passwords. As such, it's susceptible to many of the issues passwords are and is much closer to passwords than passkeys. Passkeys on the other hand, don't have shared secrets and operate completely differently under the hood.

[–] asmoranomar@lemmy.world 5 points 1 month ago (1 children)

Perhaps he means the process of setting it up. Or when it doesn't work. Or when passkeys are lost. Or using another device. A lot of people's complaints about passkeys aren't really about when it works.

It's valid I think, but also some people forget passwords can have similar experiences. For one, there seems to be this idea that if you lose your passkey you get locked out of your account forever. The recovery process should be no different than losing your password.

[–] asmoranomar@lemmy.world 9 points 1 month ago (7 children)

No. It's a completely different process. It's a bad name for what it actually does. (Unless you're talking about how computers do things, then EVERYTHING is numbers)

Look up public/private key pair encryption. It's the process that has changed.

The problem with all these "what are passkeys" guides is that it's difficult to convey the differences between password and passkeys if you don't have a deep understanding of encryption or authentication systems.

[–] asmoranomar@lemmy.world 11 points 3 months ago

You need to take the bad with the good, otherwise you'll never understand how far we've come. We hold on to slavery to remind us what it took, how efforts were not in vain, and to continue work on pushing for the things we believe in. We are here today because of the hardships we have endured yesterday. It's not "white guilt", it's to remind the world that slavery is bad no matter who does it, to teach us what it looks like, and that we all benefit from eliminating slavery, no matter the form it takes.

When we forget those things, we have things like the anti-vacc movement. People who have their own beliefs that fly in the face of reality, who've never had the experiences first hand, and to bend the notion of what is good. It rewrites the legacy of people's efforts, obscures the lessons used to fight, and trivializes the problems of the time. It manipulates both people and purpose and turns it against each.

My own opinion: Nobody feels guilty about slavery. There are only those that feel regret it's not still around.

[–] asmoranomar@lemmy.world 4 points 3 months ago

Have you tried moving his system closer? Have you tried using your system near his location? It's not just microwaves that can interfere with wifi, but also some kinds of fluorescent lights, or even infrastructure (pipes, electrical, mesh retaining, etc).

What is the signal db loss? Ping is a catch-all metric but isn't reliable for nailing down specific problems. Also the varying ping times is called jitter, and some jitter is perfectly normal - wifi tends to amplify ping and jitter. Don't get too hung up on high ping unless it is a problem.

If db loss is acceptable, is his tcp/ip stack compromised? Run a virus check, ensure his network configurations aren't being hijacked (check dns, proxy, etc). Reset the stack and configs if necessary.

Has his router been compromised? There is firmware that is going around hijacking routers for botnets - very hard to identify and reverse from what I recall. Try another router if you have one. Aside: Might be a good idea to factory reset the router and start with a clean slate too.

Is your wireless network congested? too many devices can cause large ping and jitter, even if they aren't on your network. Removing devices, changing wifi channels, disabling guest connectivity, and enabling game mode on the router can improve the congestion issue to varying degrees.

TPM has nothing to do with networking, which is good because there are bootable USB OS's you can run to test your hardware without wiping your current install if you feel like it might be another type of compatibility issue (TPM would make this much harder to do).

[–] asmoranomar@lemmy.world 2 points 4 months ago

I loved video games as a kid. They didn't limit the content. I just wasn't able to play video games during the week and I could only play an hour each day. I think that mindset backfired. Also, it didn't stop me from going over to my friends house to play video games. By the time I could afford my own, they gave up.

[–] asmoranomar@lemmy.world 17 points 4 months ago

Only if it's a present the size of a car in the garage and you invite everyone over to witness him unwrap it.

[–] asmoranomar@lemmy.world 6 points 4 months ago (1 children)

They missed their chance to go 'HBO NOW GO MAX'

[–] asmoranomar@lemmy.world 2 points 5 months ago

Oh that one is a good one, it's very busy. Using the first method the trees are on the 'bottom' and everything progressively pops out with the fish/turtle on 'top'.

The other way is reverse, the trees are on the 'top' and the fish are on the 'bottom' (like I'm looking in that 'box'). It's also really hard to see the whole picture this way, but that's just me.

Also, 'In a Box' might not be the best analogy, you can make one that intentionally feels like you're looking inside something -- it's just that most of these are made to pop out at you.

[–] asmoranomar@lemmy.world 3 points 5 months ago (2 children)

The way this works is that the image is designed to appear 'beyond' the surface it is printed on. It's much easier to relax your eyes and pretend you're looking at what's 'behind' the paper. Kind of like 3d chalk art on the road in a way.

The other way of crossing your eyes works because you're swapping the left and right eye, which gives a different, inverted appearance. Instead of a foreground image popping out of the background, it looks like the other way. Like looking in a box, kinda.

I can do both, but the latter is more difficult, sometimes requires a specific distance, and can be painful if you force it. If the image is too big, you may only be able to see a part of it. I think the first method is easier to do and to learn/train. Either way, you aren't looking at what's 'on the surface'.

...

The best way I can explain is: pretend you're sitting on the toilet, really tired and you have nothing to look at so you just lose focus and gaze at random stuff. When the tiles or cracks start to make pictures that aren't there, that's kind of the effect you want.

view more: next ›