• 0 Posts
  • 32 Comments
Joined 3 years ago
cake
Cake day: August 17th, 2023

help-circle

  • Yes, but also on the flip side, I have sat thru classes where the teacher did not know the curriculum and I had to explain things to the students. I also built the infrastructure for a computer lab and then had classes in that very lab. When the teacher couldn’t set up the conditions for a test, they consulted me to troubleshoot it (in this case, the teacher was not at fault, it was the equipment).

    I tried to CLEP, but most of the time (for me) i failed many because I was either bad at the test, covered material that I was never taught, or the course could not be CLEP. The annoying thing is that in almost every case, there was stuff that wasn’t in the CLEP that I was taught, or vice versa after taking the course.

    If the course doesn’t teach you to understand, then the metric being measured is not “understanding”.


  • Fair on the privacy aspect, but again, I’ll point out that Microsoft Family already does the age bracket thing. I think how it’s done is slightly different, as software/websites have to disclose age groups rather than requesting it. Different sides of the same coin to be sure.

    As for parents, I think it’s a mixed bag. I know a lot who are a mess at computers. Most don’t even know these tools even exist. Those that do, don’t have the time to do it properly (it only takes one night when your kid gets locked out of their account doing schoolwork due to screen time limits and your trying to troubleshoot why your approval to your kids request isn’t going thru via your phone, etc). But there certainly are also those that don’t care at all or feel they shouldn’t have to do it. It’s getting better though, I see a lot less young people with tech blindness every year.


  • So this is where devils advocate comes into play. Pretty sure we all are agreed that this law, or anything like it, is ‘not good’. And I’ll leave it at that. Just keep that context in mind as I elaborate further.

    Windows actually does do this on install. However, the Microsoft Family feature uses Microsoft Accounts. So technically, sure it’s not the OS (though it IS part of the OS, as you don’t need to download anything extra to enable it’s functions).

    But you have to go out of your way now to do an offline windows install without a Microsoft Account. If you’re that savvy, you’re capable of monitoring your child without the help of big government. If you’re a child, then nothing but honesty is keeping you from jumping walls.

    But that is windows, and this is Linux. Now I’m not making accusations, but do we really want to push the idea that this form of control needs to be pushed out across everything, simply because the current solution that would work for most families isn’t done at the “OS” level?

    And to top it off, I don’t even see it working. Most family devices are set up on an account with a single login. Managing access is not a ‘one and done’ process, at some point you will have to provide permissions, install software, change active hours, approve screen time requests, troubleshoot related problems, and more (and soooo much more if your kid is technically adept). Is it no wonder that most parents just give kids free reign to their computers and consoles?

    So before we go around and ruin the experience and privacy of everyone, can we at least ask what the people who want this have done instead? Cause it really does feel like it’s coming from a group who wants everything done for them.






  • Keep in mind, still discussing the underlying fundamentals and not the user experience.

    MitM attacks are frequently covered in white hat hacking, often after an actual event takes place. It is considered a third party attack, and it does break trust. It is a security threat, and to claim it doesn’t count is absurd. I’ve seen a few reports personally from internal, but I’m not at liberty to speak specifics about them. On the topic of replay attacks, TOTP is vulnerable, but passkeys are not (yet, I’ve seen people try though). This isn’t the only type of MitM attack, and, again, both are somewhat vulnerable.

    TOTP is nothing, nowhere similar to passkeys in any way. You do NOT generate codes with passkeys. Passkeys are a form of public/private keys that are used to create a challenge/response request and used to generate a digital signature. The keys are not passwords (aka “shared secrets”). Digital signatures are also not passwords. The only other thing I can think you mean by “code generation” is that you’re using it as a generic catch-all, but that happens with…well everything (even passwords), depending on context.

    I don’t want to sound too much like a die hard passkey fan - and you are right - passkeys are extremely overkill if you use anything above a plain old password. In some cases, layered security can be just as effective. The problem is that most people do only use plain old passwords. If we can get any kind of extra security, even TOTP, then all the better. There are also some cases passkeys are not feasible, so it’s good to have alternatives.


  • That’s false, TOTP can and has been the target of man in the middle attacks, successfully. The implementation of passkeys makes man in middle attacks more difficult, but it could still happen. So both are susceptible to third parties to some degree.

    As far as point of view, I was assuming we were talking about the process, since the goal of passkey UX is to be largely the ‘same as’. Which, to be frank, is way less dedicated since both the implementation of passwords and passkeys can vary widely (2fa, email, id, otp, etc). If we exclude those, the UX is the same - some users might be even using passkeys and not know it.



  • Perhaps he means the process of setting it up. Or when it doesn’t work. Or when passkeys are lost. Or using another device. A lot of people’s complaints about passkeys aren’t really about when it works.

    It’s valid I think, but also some people forget passwords can have similar experiences. For one, there seems to be this idea that if you lose your passkey you get locked out of your account forever. The recovery process should be no different than losing your password.


  • No. It’s a completely different process. It’s a bad name for what it actually does. (Unless you’re talking about how computers do things, then EVERYTHING is numbers)

    Look up public/private key pair encryption. It’s the process that has changed.

    The problem with all these “what are passkeys” guides is that it’s difficult to convey the differences between password and passkeys if you don’t have a deep understanding of encryption or authentication systems.



  • I get what you mean, you’re not the only one. There are generations of games that have explicitly trained you on fast twitch button mashing with graceful dodge frames and intentionally engineered safeguards so rng is in your favor to bring about the best experience. And I’m not mocking you…it’s just how it is and it gets me too. Trying to unlearn that is hard.

    I also hate the ‘difficult for the sake of difficult’. I know some people get a high over doing something incredible, but I don’t get that from banging my head on the same thing over and over. Any souls, souls-like, souls-lite or weighty mechanics games like MH get a hard pass from me.

    However, I really enjoyed Remnant, it’s a mp souls-like - something about witnessing everyone’s shenanigans but still being able to pick each other off the floor is a lot of fun. It feels different and more like what souls should have been (imho).


  • This is a case of 'it depends '. The damage isn’t caused by something being on or off. It’s everywhere. Disconnecting can isolate damage from small storms, but world ending storms have enough energy to jump air gaps and the surges would be faster than most breakers can react to. You’d physically have to rip the cables from your house to be safe. Smaller, battery powered devices would be more susceptible regardless if they were on/off. Batteries are a concern because you don’t want them to incur damage/blow up due to an electric surge.

    If this sounds overblown remember that during the Carrington Event, telegraph lines continued to operate for hours even after batteries were removed. In some cases, lines sparked and damaged equipment or personnel. These are very powerful storms that naturally induce electric current in circuitry.


  • Something to note, some AF ACT operations can be contracted out. This means that even the AF doesn’t have enough even for its own operations, and that number probably reflects the available number of ‘wartime’ operators available.

    Also, the military operates under a huge umbrella of tasks, where a 1C1 wouldn’t ‘just be’ ACT - that would be your ‘wartime’ job (specifically when you first enter), and you are ever becoming more generalized to handle a broader scope of tasks and responsibilities. If every 1C1 were used, you’d lose a lot of managers, support, training and etc to put people who are 1C1 who may not have done ATC work in years. Think First Sergeants and the like, they could do it - but you’d lose someone who has the knowledge of all 1C operations and go back to just doing ATC. That’s a heavy ask.

    So the outlook is even worse than you suggest.


  • Yes, but the military cannot just quit and find another job. They are not told to “go home and wait until a budget is passed.” And they must bear the associated costs of operation that they would typically get reimbursed for.

    It’s not that people in other agencies aren’t suffering, it’s that most those in the military would be the first to have problems that both affect the individual and the government’s power.

    As another (but silly) counterpoint, the government shutdown affects every citizen, nay, the world itself. Since the USA is such an important world power, the act of shutting down has wide consequences if it goes on long enough. So won’t you think of the billionaires?