• 0 Posts
  • 60 Comments
Joined 1 year ago
cake
Cake day: June 29th, 2023

help-circle
  • I disagree. In my experience with the younger folk, it’s almost always an issue that driving is way too expensive for what you get.

    You can do almost everything that would’ve necessitated owning a car on the internet now, and the cost of your car payment, insurance and registration, and gas is just way too high for the things that still require it. It’s cheaper to just pay a taxi or find someone to give you a ride for the few times you actually need it.







  • This one is insidious. Pretty much everyone agrees that social media is addictive and repetitive exposure at a young age has a startling negative effect on mental health.

    The downsides of this come mostly from the infrastructure that will be used to control access. If there suddenly exists a collective database that contains age and identity information for every citizen that is accessible online in some capacity to verify ID, that’s a really juicy target for online criminals and a huge blow to online privacy.

    The effects of the recent SSN hack are still to be seen, but that was a release of identification information for up to 2.9 billion people. It’s insane that people aren’t making a bigger deal of that.


  • It’s a known phenomenon.

    As it happens, people don’t often post their failures on social media, so if you’re comparing your life to someone else’s, you’re at an inherent disadvantage because you only ever see results.

    If you hang out with people in person and involved in their lives, then you get to experience the process leading to the results with all the failure baked in. It’s the difference between porn and sex.






  • I’m not sure I necessarily agree. Your assessment is correct, but I don’t really think this situation is security by obscurity. Like most things in computer security, you have to weight the pros and cons to each approach.

    Yubico used components that all passed Common Criteria certification and built their product in a read-only configuration to prevent any potential shenanigans with vulnerable firmware updates. This approach almost entirely protects them from supply-chain attacks like what happened with ZX a few months back.

    To exploit this vulnerability you need physical access to the device, a ton of expensive equipment, and an incredibly deep knowledge in digital cryptography. This is effectively a non-issue for your average Yubikey user. The people this does affect will be retiring and replacing their Yubikeys with the newest models ASAP.