Pinned toot

i want a shortcut that mentions all users on the fediverse just to say how awesome they are

yeah, it's /dev/sdxn paths. i should replace them with GUIDs...

so it works now. i guess it was a uefi bug? although i thought my fstab had GUIDs and not /dev/sdxn paths...

i tried to gdisk it, but there's no gdisk, fdisk or parted in recovery shell. tried to mount at least something. /dev/sdb3 mounted. sdb is the HDD i put instead of the ODD to keep large files (movies, music, etc) on. i opened it, and.. it wasn't sdb, it was my root partition!

so i realized it had something to do with the disk order in bios/uefi. rebooted the laptop, but i don't remember what key opens the uefi settings, pressing everything i could didn't help.

but it just booted into my os.

fuck mastodon web ui, why do you have to reload while i'm writing a long toot?! i never asked for this :cry_konata:

laptop scared me >.>

yesterday i had to force poweroff it, after systemd failed to kill a hanged vm even though it reached target shutdown (!). it worked ok after that, though.

but now, after i started it, it dropped me into a recovery shell. said that it was unable to mount sda3 bc of unknown filesystem "LUKS_crypto". my root partition isn't encrypted (it should be, though... at least the most sensitive data is on LUKS), so i thought the headers were corrupt!

also you're extracting value from all of your employees? if you want to do good in the world maybe form a coop, refuse funding, work in something that's sustainable as a business instead of a fucking tech startup?

Ah sorry yeah that's not
a) as disruptive
b) as empowering
c) as well-paying
d) other reason

take your pick

@rain (cont.) ... they had to distribute it under the same licence. So of course, if you were downloading software that linked with and contained Webkit, somewhere, buried deep in the terms and conditions, you would find a link to a zip file to the specific bundle shipped with that software (and nothing later), which contained only the source code, stripped of documentation, build instructions, git logs, etc.

realistically, without insider knowledge, you could not modify and build your won version of ...

there was a post (here on fediverse, afair) about gnu gpl alternatives, but now i can't find it in my favorites or bookmarks. does anyone have the link?

i think using rings for unlocking phones would be a good idea. you put on a ring, bring your phone close to it and enter the unlock password. next time you touch your phone with that ring, it unlocks automatically. if you take it off, it detects that, erases the unlock password from its memory and stops working that way.

more reliable than a fingerprint reader, easily disabled (just take it off), can't be emulated like other biometrics, but doesn't require entering the password each time either

if ear shape is unique for each person, it'd be nice to use it as biometric auth in phones. no stranger would be able to pick up calls, like they now can! (in fact, there're too many problems with it, so probably infeasible)

developers having powerful development hardware is actively harmful to usable software existing

there is literally an order of magnitude of power difference between the machines many developers use to create their software and the machines that their users will have - and that's assuming the users have brand new (but average) hardware

today's developers write software pretending that there will always be infinite resources, because the computers we have *let* them do that without consequences

was asked to set up asterisk/freepbx at work (moving from another server). i just started, but already hate it, ip phones are terrible, even if asterisk maybe isn't >_>

protests, tech side 

remember that this feature, on both ios and android, only disables biometric auth until you enter your PIN/pattern/passcode again. if you want to disable it for a longer time, you have to do it somehow else.

on android (9+) phones, you have to go to your settings > security and location > lock screen preferences. enable "show lockdown option". now if you want to quickly disable biometric auth (fingerprint, face, voice, etc), hold the power button until power menu appears and choose lockdown. (google's help page: .)

so. this feature is available on ios 11.2 and up and android 9 and up.

on apple's phones before iphone 8, you can rapidly press the power button five times. this will enable sos mode and disable your touch/face id, requiring you to enter your PIN/passcode. on newer phones, it is done by squeezing the power button and one of volume buttons for a few seconds. (their own website isn't clear enough about it, so here's a different link: .)

if done right, with a way to disable biometrics, this kind of auth protects you from usual people looking over your shoulder, by not showing the the passcode, but also (sadly, only if you have enough time, ~10s) from the police, by not allowing them to use your fingerprint/face to unlock your phone.

i'm not talking about three-letter agencies here, if you have to deal with them, your situation is probably much more complicated.

but in most cases, you can either see the police approaching or expect them (or someone else like them, e. g. going through customs). so a phone with biometric auth has to have a way to quickly disable that auth, as in few cases it is less secure than passcode. (modern phones do have it, i'll write about it later.)

the key here is that in most people's threat model, there aren't non-state-owned attackers who own that expensive equipment. so just leaving your phone on your desk with fingerprint auth on generally doesn't put you at risk (but it may, depending on your situation).

and as for state-owned entities, it's in most cases police. they have both expensive equipment and could collect fingerprints from your phone's screen/panel or force you to put your finger on it.

in my opinion, biometric auth on phones is safer than just a passcode when done right. you unlock your phone many times a day, for a person watching over your shoulder it won't be hard to see your passcode. it wouldn't be hard to have you unlock your phone at a specific place with cctv cams, given that the attacker is determined enough.

with biometrics, there's nothing to spy on. it's just your fingerprint or face, one either needs your body or expensive equipment to unlock your phone.

Show more
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.