[-] andreluis034@lm.put.tf 6 points 1 year ago

The latest pixel devices (since 6 I think?) already provide accees to a /dev/kvm device, so maybe you could even run a normal Ubuntu server VM on your phone for hosting these services.

[-] andreluis034@lm.put.tf 17 points 1 year ago

I guess he means that raspberry pi doesn't run a mainline kernel

[-] andreluis034@lm.put.tf 19 points 1 year ago

Although it's true that you are increasing the attack surface when compared to locally stored OTP keys, in the context of OTPs, it doesn't matter. It still is doing it's job as the second factor of authentication. The password is something you know, and the OTP is something you have (your phone/SIM card).

I would argue it is much worse what 1Password and Bitwarden (and maybe others?) allows the users to do. Which is to have the both the password and the OTP generator inside the same vault. For all intents and purposes this becomes a single factor as both are now something you know (the password to your vault).

[-] andreluis034@lm.put.tf 5 points 1 year ago

Made my own for myself and some friends. We couldn't be bothered creating account on the larger instances and have power tripping admins de-federating instances over trivial issues.

[-] andreluis034@lm.put.tf 9 points 1 year ago

I think those kind of vulnerabilities are pretty rare, though.

Not really... If you go read the security bulletin from google, you will see every month that there are a couple of issues fixed on closed source components https://source.android.com/docs/security/bulletin/2023-07-01

Also vulnerabilities related to kernel code, I highly doubt most ROM "developers" are actually backporting security fixes for that specific device's kernel branch/source.

[-] andreluis034@lm.put.tf 21 points 1 year ago

You can update your phone with custom ROMs, but it won't update the closed source components of it(device drivers, bootloader, etc...). If a vulnerability is found in one of those components, it's unlikely that it will get parched

0
test post (lm.put.tf)
submitted 1 year ago by andreluis034@lm.put.tf to c/test@lemmy.ml

Is this post getting federated?

[-] andreluis034@lm.put.tf 4 points 1 year ago

I think bitwarden fills all of your requirements.

[-] andreluis034@lm.put.tf 5 points 1 year ago

In Europe I would say debit cards are way more common than credit cards. It's very rare to see someone paying with a credit card.

[-] andreluis034@lm.put.tf 5 points 1 year ago* (last edited 1 year ago)

I ran GrapheneOS on a pixel 5 but ultimately went back to stock.

GrapheneOS was considerably slower on my phone. Apps took a bit longer to loader, but the worst was installing APKs, it takes so much longer compared to stock. Some apps (e.g. revolut) took more than 5 minutes to install, it was crazy.

[-] andreluis034@lm.put.tf 4 points 1 year ago

I’d know if someone had any access to my phone

This is really a bold claim. How or why makes you so sure of that?

If the attacker/app manages to get some application running in the background as root, how would you know that they had access to your phone?

[-] andreluis034@lm.put.tf 12 points 1 year ago* (last edited 1 year ago)

Am I naïve for thinking that manufacturers stopping support for devices, then claiming it affects your safety, is just to sell more phones?

Yes you are.

Vulnerabilities are constantly being found in the software stack used by Android, if you are running vulnerable software you're increasing the likelihood of some malicious app (or website, file, etc...) taking advantage of the vulnerability. The consequences of vulnerability vary from being able to fingerprint your device when it's not supposed, to escalateling privileges to root or even kernel mode. Although the later are significantly rarer.

and had zero security issues in a dozen years

That you know of... If the vulnerability is successfully exploited, the likelihood of you noticing are close to zero.

You could always flash a custom ROM to install the latest security patches, but you would still be missing the security updates for all the closed source components (such as the bootloader, device drivers, etc...). Not to mention all the security implications (good or bad) that comes with installing custom ROMs.

[-] andreluis034@lm.put.tf 8 points 1 year ago

What kind of "control" do you mean? Your posts/comments get replicated across all the other instances. You can't really "guarantee" a delete, since the other instances might just ignore your request for delete.

0

I'm running an instance for me and a couple of friends at https://lm.put.tf/. I've noticed that there seems to be no consistency whether or not post images are mirrored in instance's pictrs

For example:

The post https://lm.put.tf/post/22176 from !lemmyshitpost@lemmy.world has its image mirror from https://sh.itjust.works/pictrs/image/92ec8e81-1f05-4ff7-8ec7-f3bdee3d8087.jpeg to https://lm.put.tf/pictrs/image/747826a6-281f-4b1b-8ba2-7bbf452916dd.jpeg

However the post https://lm.put.tf/post/22060 from the same community, but posted by a user from lemmy.blahaj.zone does not have a mirror on my instance. The image links to https://lemmy.blahaj.zone/pictrs/image/OpIT86L1vq.jpg

Why is there a difference in behaviour? is it because the post was done from another instance and not lemmy.world? What is the replication/mirroring logic?

view more: next ›

andreluis034

joined 1 year ago