![](https://hexbear.net/pictrs/image/e1ef6912-6fa4-467b-bb65-35ff22bf09b7.png)
![](https://lemmy.ml/pictrs/image/d3d059e3-fa3d-45af-ac93-ac894beba378.png)
Your employer might use MS Authenticator but still let you do call or SMS 2FA. If you use a VOIP number, it won’t be vulnerable to SIM card swapping attacks.
Your employer might use MS Authenticator but still let you do call or SMS 2FA. If you use a VOIP number, it won’t be vulnerable to SIM card swapping attacks.
Startpage (has Google search results) or Google with private browsing haven’t given me the new AI suggestions so far
Please try again.
Reported for being a bot
“Hey, it’s totally cool that Microsoft GitHub blocked access to one of the repositories in the very center of the xz backdoor saga,” Michal Woźniak, a white hat hacker who was part of a team that discovered DRM in a Polish train earlier this year wrote on Mastodon. “It’s not like a bunch of people are scrambling to try to make sense of all the right now, or that specific commits got linked to directly from media and blogposts and the like. Cool, cool.”
Security teams that break stuff to mitigate risk and call it fixed is exactly what Linus’s Do No Harm plea is about.
Edit: It’s still disabled
Access to this repository has been disabled by GitHub Staff due to a violation of GitHub’s terms of service.
I have a desktop with Fedora
IMO snaps aren’t bad enough to choose IBM instead
One of the industry’s largest trade groups penned a letter to the Federal Housing Finance Agency (FHFA)—the entity overseeing Fannie Mae—warning that the program would have negative consequences.
[…]
The trade group received support from both sides of the political aisle, with Democrats and Republicans criticizing the project. The biggest objection came from New York Republican Congressman Andrew Garbarino, who said the program would “end up hurting consumers.”
After that, Fannie didn’t take long to abandon the program.
This sounds like FHFA’s fault for listening, lobbyists gonna lobby
Narrator’s voice: It was always about the science
Not necessarily. Sure it doesn’t perform as well as a high-end crypto miner, but it performs better than a lot of desktop PCs that use way more power than it.
But desktop builds won’t use less electricity. I use a desktop replacement gaming laptop at home, without taking it anywhere, because it consumes less power
But one of the requirements of eIDAS 2.0 is that browser makers trust government-approved Certificate Authorities (CA) and do not implement security controls beyond those specified by the European Telecommunications Standards Institute (ETSI).
State-mandated backdoors seem bad
You claim that the NED is CIA, but have you considered that the link above is not literally cia.gov?
“Thanks, I’ll add a note to make a schedule”
makes schedule never
Nitter Redirect because Twitter makes you log in if you’re just trying to browse.
For example, if you have Nitter Redirect and go to https://twitter.com/DrLongissimus/status/1474279234239619087 , it will redirect you to https://nitter.net/DrLongissimus/status/1474279234239619087
Martini
You could not live with your own OS. Where did that bring you?
Back to me
For more tech-savvy users, sure. But I thought you were looking for a way for less technical users to share scrubbed URLs. You’re not going to get the less technical users out there who share URLs to add a URL tracking filter list to uBlock Origin, but getting them to install ClearURLs is within the realm of possibility.
Yeah, some high-tracking sites do break, and I’ll need to turn it off temporarily. If ClearUrls breaks a site, it means that the site baked tracking into the functional features of the site itself (which, besides being terrifying, violates GDPR).
If you get them to install ClearUrls in their browser (Firefox, not Firefox), they can copy/paste URLs directly from their URL bar and the URL will be clean with no extra effort.
I keep it enabled in all my browser profiles pretty much always
OP is looking for an alternative to MS Authenticator. If this works as an alternative temporarily, they may still consider it worth it.
Yes, SMS 2FA is usually not secure due being vulnerable to SIM card swapping attacks, that’s why I explicitly recommended using a VOIP number, which would not be vulnerable to SIM card swapping attacks.