• 0 Posts
  • 148 Comments
Joined 1 year ago
cake
Cake day: July 9th, 2023

help-circle
  • If you’re talking about being able to regain access with no local backups (even just a USB key sewn into your clothing) your going to need to think carefully about the implications if someone else gets hold of your phone, or hijacks your number. Anything you can do to recover from the scenario is a way an attacker can gain access. Attempting to secure this via SMS is going to ne woefully insecure.

    That being said, there are a couple of approaches you could consider. One option is to put an encrypted backup on an sftp server or similar and remember the login and passwords, another would be to have a trusted party, say a family member or very close friend, hold the emergency codes for access to your authentication account or backup site.

    Storing a backup somewhere is a reasonable approach if you are careful about how you secure it and consider if it meets your threat model. The backup doesn’t need to contain all your credentials, just enough to regain access to your actual password vault, so it doesn’t need to be updated often, unless that access changes. I would suggest either an export from your authentication app, a copy of the emergency codes, or a text file with the relevant details. Encrypt this with gpg symmetric encryption so you don’t have to worry about a key file, and use a long, complex, but reconstructable passphrase. By this I mean a passphrase you remember how to derive, rather than trying to remember a high entropy string directly, so something like the second letter of each word of a phrase that means something to you, a series of digits that are relevant to you, maybe the digits from your first friend’s address or something similarly pseudo random, then another phrase. The result is long enough to have enough entropy to be secure, and you’ll remember how to generate it more readily than remembering the phrase itself. It needs to be strong as once an adversary has a copy of the file they jave as long as they want to decrypt it. Once encrypted, upload it to a reliable storage location that you can access with just a username and password. Now you need to memorize the storage location, username, password and decryption passphrase generator, but you can recover even to a new phone.

    The second option is to generate the emergency, or backup, codes to your authentication account, or the storage you sync it to, and have someone you trust keep them, only to be revealed if you contact them and they’re sure it’s you. To be more secure, split each code into two halves and have each held by a different person.


  • There’s an easier and more reliable way to limit replication; don’t hive them the means to create a small but essential part, and instead load the first probe woth many copies of it and have each replica take a set percentage.

    For instance, have the probe able to replicate everything but its CPU, and just load up a rack of them on probe 0. Every time it replicates itself it passes half of its remaining stock to the replica and they both carry on from there.








  • What was the purpose of that action? To seed shock and “ruffle some feathers”, sow disbalance under the coat of “shaking sleeping people up”.

    A goal at which it has singularly failed. There’ll be a bit of noise in the papers for a day or two, Stonehenge will be cleaned off with “No harm done” and life will move on with no useful change.

    Their stunts were effective the first time or two, but now are largely ignored or even just cause irritation.

    If they, indeed we, want to change the trajectory of human caused climate damage we need to build bridges at the community level and bring people together to force the hand of the political class. These stunts don’t do that, they just give ammunition to those who seek to prevent positive change.


  • This is an approach to life sentences I’ve considered before; I would suggest the prisoner could only petition for execution after being incarcerated for a significant period (20 years or so maybe?) and having exhausted all possible legal appeals. The delay is there to ensure it’s not a decision taken in desperation and haste. By that point, if any new evidence to exonerate them is going to turn up, it probably has, although I acknowledge that’s not always the case.

    I’m not sure I’d equate it to voluntary euthenasia as the prisoner isn’t leaving jail alive either way. On the other hand, I can see why linking the two makes sense too.





  • While I agree with most people here that finding a keyboard and screen would be the easiest option, you do have a couple of other options:

    • Use a preseed file A preseed lets the installer run completely automatically, without user intervention. Get it to install a basic system with SSH and take it from there. You’ll want to test the install in a VM, where you can see what’s going on before letting it run on the real server. More information here: https://wiki.debian.org/DebianInstaller/Preseed

    • Boot from a live image with SSH Take a look at https://wiki.debian.org/LiveCD in particular ‘Debian Live’. It looks like ssh is included, but you’d want to check the service comes up on boot. You can then SSH to the machine and install to the harddrive that way. Again, test on a VM until you know you have the image working, and know how to run the install, then write it to a USB key and boot the tsrget server from that.

    This all assumes the target server has USB or CD at the top of its boot order. If it doesn’t you’ll have to change that first, either with a keyboard and screen, or via a remote management interface sych as IPMI.






  • The article says:

    The photons travel through a resonant metasurface, where they mingle with a pump beam.

    From that, I think it’s suggesting it needs a separate beam of photons to amplify the signal, much like a transistor needs a supply current to amplify the signal it gets.

    They also say:

    This new tech also captures the visible and non-visible (or infrared) light in one image as you look through the ‘lens.’

    Which sounds like it produces an image showing both the IR and visible spectrum in the visible range.

    Mind you, re-readind it, most of the article just talks about IR, so I’m not certain what it’s actually doing. It could just be transparent to the visible spectrum. It wouldn’t be much good for driving if it did that though, the windscreen blocks a lot of IR and you’d need IR headlights!