24
submitted 1 week ago* (last edited 1 week ago) by dko1905@discuss.tchncs.de to c/trains@lemmy.ml
[-] dko1905@discuss.tchncs.de 3 points 1 month ago* (last edited 1 week ago)

I think this is the more probable version of events.

[-] dko1905@discuss.tchncs.de 4 points 4 months ago

Yeah, I find it really nice to use but I experience a lag spike when I open Mission Center.. so that's a bit annoying.

[-] dko1905@discuss.tchncs.de 11 points 5 months ago

Sadly in countries without a pirate party, like Denmark, you can't (as far as I know) vote for the EP pirate party.

[-] dko1905@discuss.tchncs.de 20 points 6 months ago

No place like $HOME

[-] dko1905@discuss.tchncs.de 18 points 6 months ago

I don't think it's primarily about the algorithm or "Public Enlightenment and Propaganda" but instead about data and company ownership. Currently the US and EU are far closer allies with each other than with china. Services that are owned/controlled by their countries are therefore prioritized, and competing services from non-ally countries are way more scrutinized.

53

cross-posted from: https://discuss.tchncs.de/post/3473050

"In this video I discuss how MGM and Cesar's Entertainment Resort/Casinos were hacked by a ransomware group and had sensitive customer data and company data exfiltrated from their servers. So far Cesar's Entertainment has paid half of the 30 million dollar to keep files from being released by MGM has paid nothing and the hackers are threatening to ruin MGM's reputation with a data leak."

166

cross-posted from: https://discuss.tchncs.de/post/3473050

"In this video I discuss how MGM and Cesar's Entertainment Resort/Casinos were hacked by a ransomware group and had sensitive customer data and company data exfiltrated from their servers. So far Cesar's Entertainment has paid half of the 30 million dollar to keep files from being released by MGM has paid nothing and the hackers are threatening to ruin MGM's reputation with a data leak."

234
[-] dko1905@discuss.tchncs.de 3 points 1 year ago

Well, it's about SUSE not OpenSUSE.

71

cross-posted from: https://discuss.tchncs.de/post/1680837

I feel it's relevant, because of it confirming the possibility of "big tech" spying and cooperating with 3-letter agencies.

[-] dko1905@discuss.tchncs.de 2 points 1 year ago

And the vscode direnv extension just makes it all work together.

[-] dko1905@discuss.tchncs.de 3 points 1 year ago

Why only four stars?

7
Ewww (discuss.tchncs.de)

Why does the community have that flag?

[-] dko1905@discuss.tchncs.de 7 points 1 year ago

The article is almost 70 days old, and Clemens Fruhwirth, one of the creators of LUKS, has responded:

A random keyboard typable character gives you around 6 bits of entropy. 20 of those give you 120 bits of entropy. Even without a KDF, brute-forcing this key space is infeasible with today's hardware. Even with PBKDF2, a 13-character password should be enough to keep your data secure for your lifetime.[1]

It is much more likely that there was some security failure in the linked case other than PBKDF2. That said, I support the upgrade to Argon2.

[1] In my thesis on LUKS, Chapter 5.3 Passwords from entropy weak sources anticipates the creation of specialized hardware for breaking PBKDF2. The "13 characters should be enough" advice is found on Page 86, Table 5.4, top left cell. It gives a 78-bit recommendation (=13 characters) in the worst-case scenario, which is Moore's law continues to double the attacker speed every 2 years.

It doesn't seem like it's such a big deal.

1

Test again :(

1
Giphy test (media.giphy.com)

A simple test

2
du sgu da smart.mp4 (files.catbox.moe)
submitted 1 year ago by dko1905@discuss.tchncs.de to c/196

rule

[-] dko1905@discuss.tchncs.de 2 points 1 year ago

DDG all the way

view more: next ›

dko1905

joined 1 year ago