Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IN
Posts
1
Comments
324
Joined
2 yr. ago

  • When making an application instead of coding for one platform you have to code for 5 and also convince Apple and Google to accept your app (Nextcloud is really feeling this one).

    Meanwhile HTML + JavaScript works on most smart fridges.

  • Permanently Deleted

    Jump
  • Tldr:

    Rootful podman with podman run --userns=auto is more secure than one rootless host user running many pods, because those pods could (theoretically) attack each other.
    though you still have the possibility of an exploit in the image pull

    Rootless podman running one pod (as in service including database and so on) per host user with different subuid Ranges is the most secure, but you have to actually set that up which can be a lot of work depending on distribution.

  • All devices launching with Android 10 and higher are required to use file-based encryption.

    To use the AOSP implementation of FBE securely, a device needs to meet the following dependencies:

    • Kernel Support for Ext4 encryption or F2FS encryption.
    •  
              Keymaster Support with HAL version 1.0 or higher. There is no support for Keymaster 0.3 as that does not provide the necessary capabilities or assure sufficient protection for encryption keys.   
        
    •  
              Keymaster/Keystore and Gatekeeper must be implemented in a Trusted Execution Environment (TEE) to provide protection for the DE keys so that an unauthorized OS (custom OS flashed onto the device) cannot simply request the DE keys.   
        
    • Hardware Root of Trust and Verified Boot bound to the Keymaster initialization is required to ensure that DE keys are not accessible by an unauthorized operating system.

    https://source.android.com/docs/security/features/encryption/file-based?hl=en

  • Lose access to your MS account = lose your data forever. No warnings, no second chances. Many people learn about BitLocker the first time it locks them out.

    It seems like they just got locked out of their Microsoft account (which stores the bitlocker key). Idk why they can't just reset their password or if this article talks about the times where people couldn't do that due to missing email access or maybe resetting the password deletes the bitlocker keys?

    Either way though, the problem is that Microsoft is forcing encryption on everyone and not properly educating them on the consequences like "Backup your decryption key if you care about the data" in a way a normal user actually listens to.