

The Pin is not designed and used for such an authentication. Also can be changed at any time:
How do I manage or change my PIN?
On your phone, go to Signal Settings > Account > Change your PIN


The Pin is not designed and used for such an authentication. Also can be changed at any time:
How do I manage or change my PIN?
On your phone, go to Signal Settings > Account > Change your PIN


Its not about being complicated, its about dumping the whole chat history with just a few seconds of physical acceas to the device.
LEA has used this method with messangers like Whatsapp for years to quicly exfiltrade the data from a victims phone to other software.
It is less intuitive to set up, but it is extremely lightweight and very fast. That is the one I recommend.
I highly question the decision process to only include the lightweight and speed. There are much more important criterias to consider, like for example stability, maintainability, support etc.
I do not need yet another service that gets abonded 1-2 years after launch or goes subscription only etc.
While lots of ppl will hate on Nextcloud, its pretty good. When you do the setup right, with cache and so on set up it’s fast and serves its purpose not only as cloud storage but as a collaboration platform where you can edit files with other ppl and much more.
If you only want a simple Web App to up and download files there are probably other solutions for that.


Looking at the research they are doing and actually looking critical and scientific on their own product, it is actually believable.
I am actually more worried about the USA honoring any contract or licensing agreementa on their end.


That should be part of the backup configuration. You select in the backup tool of choice what you backup. When you poose your array then you download that stuff again?


Yes, the secrets to submit to the distribution system got compromised and therefore the system got compromised.


To achieve a compromised update you either need to compromise the update infrastructure AND the key or the infratstructure AND exploit the local updater to accept the invalid or forged signature.
As i said, to compromise a signature checked update over the internet you need to compromise both, the distributing infrastructure AND the key. With just either one its not possible. (Ignoring flaws in the code ofc)


After gaining initial access, the malicious cyber actor deployed malware that scanned the environment for sensitive credentials.
So as I said, the keys got compromised. Thats what i said in the second post.


No you cannot, the pub key either needs to be present on the updater or uses infrastructure that is not owned by you. Usually how most software suppliers are doing it the public key is supplied within the updater.


This is incorrect. If the update you download is compromised then the signature is invalid and the update fails.
To achieve a compromised update you either need to compromise the update infrastructure AND the key or the infratstructure AND exploit the local updater to accept the invalid or forged signature.


Not completely correct. A lot of updaters work with signatures to verify that what was downloaded is signed by the correct key.
With bash curl there is no such check in place.
So strictly speeking it is not the same.


Have you been on social media? A lot of ppl acting up participating in racism, transphobia, hate speech etc. do not give a shit about protecting their identity. If the real name is not already on their profile, then their post makes them easily identifiable.
Also, there are enough laws out there that force social media providers to give out information about the users who do illegal stuff online. That would make almost everyone identifiable.
The reality is that law enforcment gives a shit about doing their job. And Social Media providers give a shit about actively protect users of those points, even tho they are obliged to in many jurisdictions.


And those handwritten notes are secure random passwords and never repeat?
Just too much work for the average person and too inconvenient to type.
Simple put, no. In order to be save with a LLM that can execute stuff on its own it needs to be completely sandboxed.
A very nice talk about flaws in agentic AI can be found here: https://media.ccc.de/v/39c3-agentic-probllms-exploiting-ai-computer-use-and-coding-agents
I can also recommend the object storage from hetzner for backups. Quite price competitive.


It actually does both. Not really tested the multimonitor features but its there and it works, not sure if to the same degree as in rdp.
There is a box for manually added monthly savings. But yes, hard to classify what you would actually subscribe to if you would not have a server already.
But same for video. I would never buy 3 streaking service at a time.


The other answer is already good but I answer more general.
Rate limiting. Do not allow as many requests as your CPU can handle but limit authentication requests. Like a couple requests per second already goes a long way.
Honestly, the time i had to manually intervene since ~2 years is less then 5-10 times, and that is way before the stable release. So I doubt that.