Trying2KnowMyself [they/them, comrade/them]

  • 0 Posts
  • 12 Comments
Joined 2 years ago
cake
Cake day: January 20th, 2024

help-circle










  • demanding students to eat their meat

    Nah. I demand you stop eating meat.

    Guess I’m not a mod, though, so take the rest of this with a giant serving of salt:

    You’re getting banned in part because you post the same things over and over again and don’t seem to actually incorporate any of the feedback you get in response.

    You’re getting banned in part because you’re participating in communities you’ve previously been banned from (and, per the prior point, not changing anything about how you participate in those communities).

    You’re getting banned in part because your takes are often contradictory and unrealistic, and primarily based in historical revisionism.


  • I don’t use Windows often, so I might be missing some context - every Windows computer I’ve used has an account with a password that I need to type in sometimes, though admittedly not for every privileged operation. They prevent most people with physical access from doing anything, in the same way that the locks on your doors or windows do. Opportunistic actors are prevented from access.

    Most Linux distros probably tend to prompt you to actually type in your password more often, but:

    • SSH: if you aren’t connecting to your computer via SSH you have no reason to be running an SSH Server. In most cases, you should be using a key pair for auth, and the password for the key (if set) is what you’re typing in. This provides a layer of security beyond what a password-less key pair offers because physical access to your private key no longer grants access to the remote system without the password.
    • Encrypted drives: similarly adds a layer on top of physical access necessary to decrypt the data
    • Keyrings: password re-use is a bad thing, and re-using your login password for what amounts to a password manager is also not great practice, though admittedly relatively common