Hacker News new | past | comments | ask | show | jobs | submit | lausbub's comments login

What are passkeys?


It is public key cryptography. You give websites your public key, and keep your private key hidden. When you sign in to a website, they send you a nonce. You then digitally sign the nonce with your private key. They verify that the signature was signed with your private key, allowing you to log in.

There is no private info (aka a password) going out in public so you don't have to trust anyone to keep your password secret.

It greatly reduces the attack surface of logging in, but the attack surface is moved to the weakest part of the system, aka the user.


They're an authentication method that uses public/private keys instead of passwords. In websites the standard name is called WebAuthn.

This is similar to SSH or git operates when you disable passwords and use keys in ~/.ssh, for example.

You can store the private keys in YubiKeys or in password managers.


Another way for Google to collect your credentials.


And Microsoft, as per the case here. Or Apple.


Moreso another way to promote vendor lockin and planned obsolence.


Sounds like a case for lazy glasses.



The "infinite depth" seems to be a matter of definition. It's practically infinite if you include feedback loops via learning. If you exclude learning, then it's far from "infinite". Activations linger for up to 15-30 seconds, so at oscillations of around 30 Hz that would result in about 450-900 loops (times an unknown small multiplier for the actual number of layers). But the brain presumably only backprops/optimizes a few layers at a time and not much "through" time.


There's also evidence that the brain does optimize through time and might be implementing, at least in some places, algorithms close to LSTD.


So you converted the RGB to CMYK to get a subtractive color space for colored pencils?


Nothing that advanced I’m afraid - I eyeballed layering different colors until it looked right.


I'm looking for something more lightweight, ideally using only Bash script. So far I've found this: https://mullikine.github.io/posts/nlsh-natural-language-shel...


I'm not 100% sure, but Reddit seems to shadowban accounts created from some IPs based on some reputation score. Perhaps malicious activity is occurring on your network due to malware?


May have also been unlucky enough to be reallocated someone else's toxic IP when his ISP changed his dynamic IP. That's happened to me a couple times


Could be, the sin of dynamic IP.


Source? I use Telegram as a normal messenger because it has a good UI.


Anecdotally, I live in Germany and use it for that almost exclusively, and know a couple of coworkers who also use Telegram like this.


I just found these tools that help with migration. They pretty print the configuration XMLs such that one can transfer the settings manually through the GUI step by step and finally verify with the second tool.

https://github.com/TKCERT/pfFocus

https://github.com/AndyX90/OPNReport

https://www.reddit.com/r/OPNsenseFirewall/comments/masujb/ti...


But don't use these if your configuration is simple enough that you can manually recreate it, on the completely-impossibly-rare chance that pfSense has managed to subtly bork itself and you're switching to OPNsense to get a more reliable device....


I highly recommend implementing the firewall rules form scratch.

Firewall rules tend to aquire "cruft", especially in domestic settings, where you add rules to "fix something", and there is rarely any review of existing rules.

Personally i keep a spreadsheet of the firewall rules i need, including inter VLAN communication, with source/destination ip/port as well as a link to any article describing why this port needs to be open (like Sonos across VLANs, etc).

It sounds cumbersome, but it doesn't change frequently, and reimplementing it in a new firewall takes 30-60 minutes.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: