• 0 Posts
  • 68 Comments
Joined 11 months ago
cake
Cake day: October 19th, 2023

help-circle




  • Not being end-to-end encrypted is meaningless to law enforcement if Telegram refuses to turn over the chat contents (which they do). Law enforcement can’t just eavesdrop on the conversation without Telegram’s cooperation. The chat contents are still secured by TLS from the user’s device to the Telegram servers.

    Smart professional criminals rarely use Telegram for this stuff anyway. There’s WhatsApp and plenty of other popular platforms of end-to-end encrypted




  • Password is necessary for two-factor authentication. The factors of authentication are something you know (like a password), something you have (like a cell phone), and something you are (like a biometric).

    An example of three-factor authentication would be this—imagine a spy going into a secret bunker. They need to scan their iris, insert a key card, and then enter a passcode before the door opens. This has all three factors of authentication; the passcode is something they know, the key card is something they have, the iris scan is something they are.

    If it just sends a code to your phone, that’s one-factor authentication (something you have). Anyone with your phone can get into your account. Unless, of course, your phone hides its notifications and you have a screen lock. Then that’s actually two-factor authentication because you also need to know the phone PIN or have the biometric.

    If it just asks for a password, that’s one-factor authentication (something you know).

    If it asks for your password and then sends a code to your phone, which you need a fingerprint or face scan to unlock, you have achieved three-factor authentication.

    Edit: Interesting tidbit—in the USA, you can rent a mailbox at the post office to receive mail when you don’t want to give out your real address. Useful for privacy reasons. I’m sure they have similar things in other countries. These mailboxes come with a key. This is actually two-factor authentication, because the keys usually don’t have the mailbox number written on them! So you have to have the key and also have to know which mailbox among the hundreds at the post office it opens.


  • TOTP is standardised by RFC 6238 so all TOTP clients must comply with the standard and therefore work equally well. Pick the one whose UI you like the most and is otherwise good enough for your use case and personal preferences. It’s similar to arguments over CPU thermal paste—its presence or absence makes a much larger difference than the method of application.

    You do, however, want to pick something that is free and open-source and also popular. Google Authenticator (closed source) definitely is a functional TOTP client but you have to trust that the Google engineers have done a good job building a secure app. Since it’s Google, they probably have, but a principle in security is that you should not have to trust more people than absolutely necessary.






  • NateNate60@lemmy.worldtoComics@lemmy.mlBillionaires and the climate
    link
    fedilink
    arrow-up
    9
    arrow-down
    1
    ·
    edit-2
    1 month ago

    …which increases the cost of doing business for those companies.

    And if eco-terrorists are successfully killing their directors, then they are probably also setting fire to their offices, mailing poison to managers, sending death threats and hate mail to employees, vandalising company property, calling in bomb threats to their refineries, executing those threats…






  • No, of course, I cannot. I do not judge what category someone likely falls into based on whether what they say matches nearly word for word a “promoted” viewpoint. In some cases, I mostly agree with what they said but it’s painfully obvious that person didn’t come to that conclusion through their own thinking but is rather just parroting a screenshot of a post on the site formerly known as Twitter.

    You have missed the entire point of my comment. If someone is likely to be in categories 2 or 3, I dismiss them if the viewpoint is otherwise not worthy of discussion, which it usually is not. I don’t care if this causes me to misjudge the intentions of some people, because that is inevitable in any probability-based judgement system. What matters is picking what is most likely correct.

    I don’t feel that you have the ability to grasp this point and you’re just going to come up with another argument I didn’t make to attack.


  • No, I am not. I wouldn’t say it if it were made up. Who have I got to convince by making shit up? I am not pushing any viewpoint at all.

    I base my assertion on interactions with people on this platform. Whenever someone parrots a point that is promoted this way, they’re almost universally just repeating what some wisecrack said on X that sounds correct enough to not investigate further or think critically about and is agreeable to their worldview.

    I will not argue over this. You either accept what I am saying or you don’t, but I don’t give enough of a shit either way to get into an argument.