I know lots of people that have their 2 factor auth setups on the same computer they are using to login. If you can compromise that computer, there's no additional "2fa" needed.
All it takes is some engineer that needs admin access for their job installing something.
Well, I think it's as simple as you say. Phones have completely taken over the market. The majority of people don't find any value in having another device that's only differentiating factor is that it isn't their phone. (You didn't mention headphone jacks).
It's just like portable GPS devices, electronic organizers (https://www.youtube.com/watch?v=qdeE_kiG5Co), electronic translators/dictionaries, calculators, alarm clocks, ...
Your point is good but I do want to mention that I still use a garmin inReach when I'm going to places that are outside of cell service range. It's basically meant to be used with a phone anyway, but I get some peace of mind from having a specialized device to do things like call for help.
I was actually thinking about MQTT after I posted this.
I'm leaning towards just allowing the mqtt server you connect to to be changed, so that you can point it at whatever in the future, and all messages are plain text and documented.
I have a cheapo Android phone I had laying around, used developer mode to make it always select tether instead of mass storage and I've got a (prepaid) data SIM in there.
When we travel the Beryl AX is our own hotspot, all devices can connect to its network. Then I just pick the best way to get the Beryl to the internet. Sometimes it's wired, sometimes it's connected to a WiFi, sometimes I need to plug in the phone and we use that.
And the best thing is that it can do failover, so I can have the hotel WiFi as the primary connection, but it'll fall back to the 4G phone connection if something goes wrong.
I used mine with the same SSID as my home network!
So when I travel I can either tether a phone and all the family devices just connect, or bridge it to the destination network and again let all the devices connect as if at home!
So could you explain the process by which you ‘tether a phone’? Is that don’t by plugging the phone in via usb? Is it paired via Bluetooth? Do you wifi the phone to it and spread the internet like that? I think some of us are quite curious about the specifics on that point :)
Sounds great!
P.s. I love (and am horrified) at how easy it is to ‘hijack’ a devices wifi just by making a network with the same name (and no password). I’ve done it myself over the years to make it easier for family or friends while travelling. But I always felt a bit ick about it working.
reply