• 0 Posts
  • 113 Comments
Joined 11 months ago
cake
Cake day: August 9th, 2023

help-circle
  • … what?

    Them: “I want a centralized place to handle all my graphics stuff, so I can access graphically intensive things from any device.”

    You: “Must be incest renders because you already have hardware and say you use it for work.”

    So according to you, contractors don’t exist, iPhones can play PC games, and anyone wanting to split PC resources between multiple use cases is shady.

    What’s ridiculous is that you seem to think extreme paranoia is a normal thing in everyday life.


  • KairuByte@lemmy.dbzer0.comtoSelfhosted@lemmy.worldAlternatives to CloudFlare?
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    2
    ·
    edit-2
    17 days ago

    Most people are under the impression that their IP being public is somehow super dangerous, and that “hackers will attack me” if it ever gets out. So likely “all the attacks against my entire network.”

    Edit: Secondary thought, they legitimately have unsecured endpoints on their IP, and are hoping no one will notice if they aren’t handing out their IP to others. Still incorrect though.















  • You’re misunderstanding. Totp apps require authentication to use them, be it a password or bio-authentication. SMS does not, it just requires the phone number.

    You can get the phone number through any number of ways, but it can be done remotely meaning no one ever interacts with you or your phone. Through various methods, they have your phone number transferred to a different phone, and then have the SMS sent directly to them.

    Totp apps (typically) have a backup system in place. 1password as an example, uses their servers to host the data. But you can also back that up. The chances of someone gaining unauthorized access to your Totp account comes down to your security, and which service is chosen. 1password again as an example, is fully encrypted, they can’t see your passwords, if you forget your security token, the only solution is to wipe the entire password store and start again.

    The difference in security is mountainous. It’s the difference between a single family home, and a bank vault.


  • Poorly secured keys usually still require device access, unless they are secured so poorly that the individual would be compromised in one of many other ways regardless.

    Stealing a phone number requires, at most, paying off an employee at a telco company. At best it just requires a call and some social engineering. And don’t forget, people who leave their phone laying around without a passcode exist.

    Now, neither of these are really options for a dragnet approach, they’d need to be targeted. But the fact that one can be done fully remote should be a red flag.