asmoranomar

joined 1 year ago
[–] [email protected] 3 points 3 weeks ago (1 children)

Even if, still should do ice cream gig anyways.

[–] [email protected] 6 points 1 month ago

waves hand These aren't the droids you're looking for.

[–] [email protected] 1 points 2 months ago* (last edited 2 months ago)

Nothing stopped the person from calling road service to wire the car up, save for the fact that a child was involved.

But there was. And ensuring the kid is safe takes top priority, and the last thing anyone wants to hear is another case of emergency responders dragging their feet while another kid dies. Smash your way safely into that car, THAT is what they are trained to do.

Firefighters deal with a lot of shit and receive lots of training. I would argue that most firefighters know about the issues being laid out, and policy, not lack of knowledge, dictates a process to be carried out. I really don't think this is a situation they should be vilified over if it saves lives.

Edit: If it wasn't clear, nobody is complaining about getting off work and finding out their car is dead, and having to call the fire department to show up with the jaws of life.

[–] [email protected] 11 points 2 months ago

A better example is to explain the chaos of having to go to the grocery store and pick up some hot dogs and buns. You know the pain.

[–] [email protected] 3 points 2 months ago

Why would you break the 2nd? Are you one of those liberal types? /s

[–] [email protected] 5 points 2 months ago

Clearly it's the forbidden ice cream sandwich from the last ice age.

[–] [email protected] 13 points 3 months ago

100k voters attended. Not surprised it doesn't look the same as 100k people.

[–] [email protected] 21 points 3 months ago (9 children)

I'm not an expert, but can you not be both?

[–] [email protected] 6 points 3 months ago

And even if it was, it would be the right move. The last thing we want is to stop risk management because there's only 2 hours left and the door hasn't fallen off so far.

[–] [email protected] 3 points 3 months ago

AM radio is also used for time keeping and weather transmissions for embedded systems that don't need Internet or heavy computing power (like a clock on your desk or a watch). It's also good for emergencies. All of which can be passed in analog audio or digitally modulated (or both). Probably not exciting for music, but the fact that it's there and you can tune into it to find out the weather or traffic is useful.

[–] [email protected] 10 points 4 months ago* (last edited 4 months ago) (2 children)

I was a mix-up that was quickly resolved because the baby they gave my mom had the wrong bits. It happened again with my sibling. And my other sibling. For the exact same reasons. We all joke that none of us are really related.

But it really makes you think...

[–] [email protected] 1 points 4 months ago* (last edited 4 months ago)

Close, but you are still trusting the device you own. If I were to compromise that device, I could capture that key and use it. Again, this is my limited understanding, but a zero trust solution works in such a way that the actual keys are not stored anywhere. During setup, new temporary keys are generated. A keypass binds to the temporary key for use of authentication. The temporary key can be revoked at any time for any reason, whether it's due to a breach or routine policies. It can be as aggressive as it needs, and the implication is that if someone else (either you or an attacker) got issued a new temporary key then the other would not receive it. Using an incorrect temporary key would force an initialization again, using the actual keys that aren't stored anywhere.

The initialization process should be done in a high trust environment, ideally in person with many forms of vetting. But obviously this doesn't take place online, so there is the risk that your device is not trusted. This is why the process falls back on other established processes, like 2FA, biometrics, or using another trusted device. How this is done is up to the organization and not too important.

But don't get too hooked on the nuances of passwords, keys, passkeys,etc. The entire purpose is to limit trust, so that if any part of the process is compromised, there is nothing of value to share.

Disclosure: Worked in military and this seems to be a consumer implementation of public/private key systems using vector set algorithms that generate session keys, but without the specialized hardware. It's obviously different, but has a lot of parallels, the idea in this case is that the hardware binds to the private/public keys and generates temporary session keys to each unique device it communicates with, and all devices can talk with members of it's own vector set. Capturing a session key is useless as it's constantly being updated, and the actual keys are stored on a loading device (which is subsequently destroyed afterwards, ensuring the actual key doesn't exist anywhere and is non recoverable, but that's another thing altogether). My understanding of passkey systems is solely based on this observation, and I have not actually implemented such a solution myself.

view more: next ›