Easter egg and a little fun. Been there for decades.
Easter egg and a little fun. Been there for decades.
That’s not suspicious, that is the normal port for it to run on. It is not typical that they would include the port number but they may use a different one for testing and automatically change it or something.
It’s a lost mastodon user with their shower thoughts.
I thought it was Surge that had that unfortunate side effect.
If they arrest someone to gain access to their key, they don’t need this attack to use their key. They can just use their key.
One thing the article doesn’t make very clear is that for 2FA the PIN requirement comes from the site itself. If the site requires User Verification, the PIN is required. If not, it is not prompted even if set and this attack is possible. The response to the site just says they knew it.
It is different for Passkeys. They are stored on the device and physically locked behind the PIN, but this is just an attack on 2FA where the username and password are known. (In depth it’s more than that, but for most people walking around with a Yubikey…)
It also seems limited in scope to the targeted site and not that everything else protected by that specific Yubikey. That limits how useful this is in general, which is another reason it is sort of nation-state level or an extremely targeted attack. It’s not something your local law enforcement are going to use.
I think the YubiHSM is a much more appealing target, but that isn’t so much a consumer device and has its own authentication methods.
I was confused how a resume or application would be largely affected, but the article points out that software is often used to look over social media now as part of hiring (which is awful).
The bias when it determined guilt or considered consequences for a crime is concerning as more law enforcement agencies integrate black box algorithms into investigative work.
Amazon is notorious for combining stock, “the seller” often doesn’t matter.
I think this is the crux of the article. In the past most people have considered photographic evidence to be very convincing. Sure, you could be removed from a photo of Stalin, and later people could do photoshop (with varying realism), now it’s a few words to make changes that many people believe without hesitation. Soon it will happen to video too, very soon.
Most people are not ready for it. Even shitty AI photos on social media get huge reactions with barely a handful calling them out.
Sir, this is a Wendy’s.
I think they gave people time to get over the hype and they saw that what they had was good enough. Especially once inflation hit and they had less extra money.
The game Overlord on the NES had the best intro music of the generation, IMO. It was a port of Supremacy from Amiga and other PCs. The Commodore 64 version had really great intro music too! (I love SID music and warez chip tunes) The Commodore intro melody was later used in a Machinae Supremacy song.
I really enjoyed the game StarTropics too. It had real world tie in stuff with physical media (anti-piracy, but it was neat), and I enjoyed the music and story. The second StarTropics had graphics that blew my mind, everything just looked so smooth.
The foundation staff pay is public, and not that high. The corporation pays corporate wages.
Mozilla org isn’t the concern. Mozilla Corp, the for profit company, makes Firefox and has to worry about things like revenue for the most part. Mozilla org used to develop it and could fold it back in if it went really bad, it would definitely hamper development but being the premier browser is more of a Corp goal than an org one. Most likely the corp will just find a different search partner again (Google hasn’t always been default).
Amazon sold at a loss, but I don’t imagine the employees or suppliers and their employees feel like being paid was a waste.
Much like voting, you can join AARP at 18.
Just delivering the important infos here.
eBay has implemented their passkey support poorly. “Turn off” will invalidate them. Most sites have a list of passkeys and you just delete the one you don’t want working anymore. At that point it doesn’t matter who has it, it’s useless.
Laptops are often taken outside the network.
You delete it from your account, that makes it invalid. Just like removing an entry from authorized_keys. If the site does this after changing the password or not is up to them.
Cylons leave nothing to chance.