

Former Reddfugee, found a new home on feddit.de. Server errors made me switch to discuss.tchncs.de. Now finally @ home on feddit.org.
Likes music, tech, programming, board games and video games. Oh… and coffee, lots of coffee!
I � Unicode!




Having not read the article: “Let’s apply Hanlon’s Razor: Oh, probably it just collects the data locally and caches it until the vendor’s servers are reachable. After a while the data partition was full and it stopped working as this case was never deemed possible when this was developed.”
Having read that the kill command was logged and he found it in the logs: “ok, there are no technical details, so there might still be a misunderstanding, but that’s not what I expected!”


That’s basically any modern network. There is no more trivial “inside our network” vs. “outside on the internet”. Networks are segmented on a need-to-know principle. You can access some information from the public internet. Some other things can be accessed from the internet, but only on corporate devices, if your user AND device is whitelisted. And then you have one or more VPNs on top of that for more sensitive stuff. Also those VPNs may be “dynamic” in the sense that it may also be dependent on the user, device and authentication method what is currently accessible over that VPN connection.
I get the idea, and in general I love it - especially since they eliminate phishing in theory. BUT making my device my “password” now shifts the single point of failure from me forgetting my password to me protecting my devices from any kind of error/damage/data loss/… Collecting all passkeys in your Google Account is probably also not the best idea, considering how little chance you have to get your account back if it ever gets locked by a random event you may or may not have participated in.
Having them device independent (e.g. in a password safe) is nice, though. But then, if I use my password safe right, I should already be somewhat protected from phishing, as my auto fill won’t trigger on a random phishing site.
Mine didn’t want to migrate and I had to build them a new PC with Win11 (their old one was barely able to run win 10 and had already some hardware problems, so a new one was on my bucket list for a while) - but… yeah the most time was spent tracking down all these passwords and accounts they were constantly using without knowing which email address and which password was used for the account…


Русский военный корабль, иди на хуй?


🍆💦 ✊👁️👄👁️👌


So also cancel ALL cargo flights. Got it.


With some kind of pointy hood?


I mean… Is it really spying? Your company can detect which AP or Switch you’re connected to (or if you’re using a VPN from home), so they do have that data anyways.


Wasn’t it also some kind of DNS problem on top?


He feared for it to get caught in a spam filter.


Please wipe verification ass to continue


In store:
Clerk: "Well, then… I’d guide you to ShinyBrand. They tick all the marks for what you’re looking for and…
Customer: aren’t those the guys that made me watch a 7 minute unskippable ad, when I was in town on a public toilet suffering a spontaneous and explosive diarrhea, while waiting for a new piece of toilet paper to wipe my sore ass from all that shit?!


Don’t think so, there was no journalist in the chat group…
Oooohhhh, those memories - back then, when I googled and the results always linked to ExpertSEXchange - but the company proxy server blocked that because it obviously is a porn site… 🤦


It looks like you’re trying to brake. You’ve used up this months braking quota. Braking will be enabled again in two weeks. Please enter credit card details to upgrade your subscription to allow unlimited braking*.
*Fair use policy, limitations apply. Braking is not available on all roads. If you’re using the brake to often, an additional braking fee might be applied to your credit card for each use. Braking fee and subscriptions do not include mechanical wear, new parts or checks by a mechanic.




