thisisawayoflife

joined 11 months ago
[–] [email protected] 18 points 9 months ago

All conservatives are idiots. You heard it here first.

[–] [email protected] 3 points 9 months ago

Probably. I haven't really seen much pop into my feed either lately. I just assumed I nipped it in the bud, but there might be some defed action happening behind the scenes too. I take no credit here, I'm just exploring the space as they say.

[–] [email protected] 5 points 9 months ago

Like the other user said. It's really up to personal preference. I didn't need porn clogging up my internets tubes. Trying to keep that wide open for those gambling horses. Nothing against those communities, it's just not my thing or what I come here for.

[–] [email protected] 7 points 9 months ago (9 children)

Thank God I've blocked those communities.

[–] [email protected] 2 points 10 months ago

Yes, same type of device.

[–] [email protected] 3 points 10 months ago* (last edited 10 months ago) (2 children)

Adding a hardware key, like Nitrokey, would be an additional level of safety there. I would not use the database without some kind of additional key (something you know and something you physically have).

If there's something nefarious that has user access, you've already lost in that regard.

[–] [email protected] 12 points 10 months ago

There isn't really privacy in email unless all recipients are encrypting the email body itself. Email leaks a lot of metadata even with GPG use, and it's typically stored at rest in plain text.

There are tweaks you can do that will accept the unencrypted email, then immediately encrypt the message with your key so only you can read it. Then it would be safer at rest, but less convenient. It really depends on your threat model.

[–] [email protected] 2 points 10 months ago

Well, yeah. Private network sysadmins tend to act like a big hammer. Torrents can be terrible on a network, particularly Linux distro torrents, especially if the hardware itself was put together on a shoestring budget. That said, a lot of universities are mirrors and there isn't really a need to go outside the university network to obtain that stuff. Not all the time, though.

[–] [email protected] 3 points 10 months ago (2 children)

While we're on the topic of open source products, may I suggest the SoloKey:

https://solokeys.com

[–] [email protected] 3 points 10 months ago
[–] [email protected] 35 points 10 months ago (11 children)

Been using KeePassXC (and before that, KeePassX) since I abandoned LastPass about a decade ago. The apps integrate with Nextcloud perfectly and at least for me, it's a breeze. I use it for TOTP too, and I second the recommendation of a hardware token for an additional layer of security. There are some USBc options that work on phones (I'm using a pixel 7 pro).

[–] [email protected] 1 points 10 months ago

Also, government reach is infinite. If you're using them Internet, the government has your traffic. This isn't a conspiracy, it's a real thing. Go look up Room 641a.

view more: next ›