Desert Nomad, First Responder, Reverend, Intelligence Analyst, Computer Expert, Cowboy, Sorcerer, Metaphysician, Polymath.

  • 0 Posts
  • 9 Comments
Joined 1 year ago
cake
Cake day: October 4th, 2023

help-circle
  • Elias Griffin@lemmy.worldtoPrivacy@lemmy.mlThreat Modelling 101
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    2 months ago

    I just happened upon this thread and security of all types is my specialty so I just wanted to say that nothing here is personal. I’m trying to be helpful giving folks “actual security” as in not “better than putting passwords in plain text files”. Lazy idiots will be lazy idiots with Keepass as well. I can’t tell you how many stories I’ve heard from colleagues that those people aforementioned just put the main Keepass password in a plain text file.

    I upvoted the OP and your reply for bringing TM novelty and awareness.

    I do see what you’re going for, but the mitigations you wrote can be found everywhere on the Internet for over a decade. It’s average commodity information combined with that fact that we are not more secure these days, but less secure in 2024 that ever.

    In the case of password databases, this is de facto less secure than paper and pencil, which is not extreme by any measure and actually takes little effort.


  • Elias Griffin@lemmy.worldtoPrivacy@lemmy.mlThreat Modelling 101
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    2 months ago

    Quadhelion Engineering Corrected Mitigation Strategies:

    • Never use an electronic password manager, use index cards and an art quality graphite pencil instead
    • The loss, hack, crack, or malfunction of a MFA device can be absolutely devastating. Use with caution and sync three of them, 1 of them kept in a firesafe at all times
    • Never regurlarly update all software and devices, choose your updates and choose your timing depending on your environment and posture instead
    • Never be reliant upon an electronic home security system and lock devices (if they get that far, major damage has occured), use a Rottwieller, Great Dane, Mastiff, German Shepard, or Akita (never Pitbulls or Dobermans) alongside yourself with non-lethal weapons until lethal force is used upon you, instead

    You asked and the Non-lethal (Less-Lethal) Weapons Industry has delivered. Pepper ball guns, Radically Improved Tasers, Electrical Stun Devices, Batons, Kubatons, Pellet Guns, ColdSteel Brooklyn Smasher, Slings, and also you may not think unless you played, Paintball Guns, big nasty bruises at medium range if only wearing a T-Shirt.


  • What a superb list! Saved.

    I was thinking of writing a guide on how to lead a digitally private and secure “life” since so many bad guides are out there.

    I’d like to add that the best private and secure Operating Systems are:

    • BSD
    • HardenedBSD
    • Commercial UNIX (HP-UX, AIX, IRIX)
    • Void & Alpine Linux
    • Indie Operating Systems

    Private Search Engines


    Private Browsers

    • Lynx
    • Librewolf
    • Waterfox
    • Qutebrowser
    • Hardened Firefox (at my repo)

    Qubues runs containers yes, but the unique use of a paravirtualized Fedora Linux kernel itself leaves open lots of unique security holes and is therefore extremely hard reviewing the security of it yourself.

    GrapheneOS is constantly being showboated by Ed Snowden which is a red flag and I did experience app contamination on it. I would also suggest PostmarketOS. Definite no on CalyxOS.

    I’d like to throw in my own Free Open Source, git clone, security repositories for BSD and Firefox available on Bitbucket, Github, and my own self-hosted git server with the latest files. All my software is currently written in Python (my very first Python scripts!) and short so it’s very easy to review.



  • So many great viewpoints here. Crystal for faster and concurrent Ruby. Crystal has a pretty advanced Web Framwork called Lucky not many know about. Haskell so good, but hard to convince people to use it for projects. Haskell also has a very advanced Web Framework called Integrated Haskell Platform. Scala’s very impressive feature set. Zig is in such a super position and Julia is capable in so many ways including Fortran integration.

    I’m surprised no one has mentioned Chapel or Nim though! My favorite programming speed benchmark is spectral norm and even though Chapel is the fourth fastest language (not benchmark) it’s not using the forte of grid parallelism!

    Nim is getting to be quite the monster and not beholden to Mega-Corps finance/steering like Python and Go are.

    Also I want to add that Zig blows Rust away in many performances!

    NOTE: Just as an ethical, solo, non-commercial Engineer, I sponsor Nim on Patreon and Zig on Github

    Full Disclosure: It was me that downvoted preferences for Python and Go as the one language. One lang a low level scripting lang? Preposterous! LISP can do/be anything for example. Get out of here with that undercover marketing/influencer speak!




  • It gets worse. Not having used my Gmail account for years, old phone died, moved to another state with new number there, and I traveled back to Los Angeles in order to log in on the same network, same laptop, correct password, but I put a new HDD in my Macbook Pro which caused Apple to re-ID the OS, and locked out! No way to recover, I try twice a year. Will not even reset to the correct backup email I have! I just get an email saying I tried to login with no actions possible!

    Google stole parts of my life from me, the history in those emails, wow!

    STOLEN

    I AM NOT MY PHONE


  • Elias Griffin@lemmy.worldtoPrivacy@lemmy.mlPlease, do not use Brave.
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    5
    ·
    edit-2
    1 year ago

    Spyware is a bit of a stretch. However, let’s talk about Firefox. Mozilla Corporation is a Billion Dollar Corporation that is tied at the hip to Google and uses 115+ servers to track every single thing you do.

    Chromium explicitly uses shared memory and is technically able to write and execute not only shared data from private/incognito to regular windows or tabs but adjacent processes. You can search for mmap in the Chromium repo or try to use Chromium with FreeBSD or GhostBSD sysctl.conf set with kern.elf64.allow_wx = 0 - it won’t run.

    The Precise Geolcation Timeout for Firefox is 68 years.