boatswain

joined 1 year ago
[–] boatswain@infosec.pub 2 points 7 months ago (2 children)

Gotcha, thanks! So you can just swap Monero for Bitcoin without going through KYC stuff?

[–] boatswain@infosec.pub 7 points 7 months ago (4 children)

How do you use a public ledger for privacy? Are you just using Monero or something?

[–] boatswain@infosec.pub 2 points 8 months ago

The first rule of tautology club is the first rule of tautology club.

[–] boatswain@infosec.pub 1 points 8 months ago (4 children)

Why is it a terrible idea?

[–] boatswain@infosec.pub 59 points 8 months ago (2 children)

I mean, the domestic businesses are the ones who own Congress and are using it to get rid of a competitor.

[–] boatswain@infosec.pub 11 points 8 months ago (1 children)

SMS-based can be intercepted, while app-based are calculated on your phone. If you're using SMS -based, all someone needs to do is take over your phone, and they're getting your 2FA codes. Here's how easy that is: https://m.youtube.com/watch?v=lc7scxvKQOo

[–] boatswain@infosec.pub 2 points 8 months ago

Mint is super comfy. Garuda is cool. Pop_OS! is as annoying to use as it is to type.

[–] boatswain@infosec.pub 0 points 9 months ago (1 children)

I think we're saying the same thing there: LLMs are great at spewing out a ton of content, which makes them a great tool for brainstorming. The content they create is not necessarily trustworthy or even good, but it can be great fuel for the creative process.

[–] boatswain@infosec.pub 2 points 9 months ago (8 children)

You're confusing brainstorming with content generation. LLMs are great for brainstorming: they can quickly churn out dozens of ideas for my D&D campaign, which I then look through, discard the garbage, keep the good bits of, and riff off of before incorporating into my campaign. If I just used everything it suggested blindly, yeah, nightmare fuel. For brainstorming though, it's fantastic.

[–] boatswain@infosec.pub 3 points 9 months ago (1 children)

Does KeePass support passkeys?

[–] boatswain@infosec.pub 6 points 9 months ago

On top of all that, most hitting contacts I've seen contain language saying that if you use company resources to make a thing, that thing, the company owns that thing. Seems likely that in addition to firing they could compel you to turn over the drive and wipe it.

[–] boatswain@infosec.pub 1 points 10 months ago

That kind of attack is already a thing; whole it will most likely remain one in the future, it is one in the present as well.

view more: ‹ prev next ›