this post was submitted on 13 Oct 2023
627 points (98.8% liked)

Technology

58155 readers
3565 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 4 points 11 months ago (2 children)

They seem to have calmed that down in recent years, and rely on the dumb public to store all their secrets on readily accessible corporate servers.

The maths war is hard to win (bigger keys handle most of that), and I honestly doubt most current encryption can be beaten reliably even with quantum computing.

[–] [email protected] 3 points 11 months ago (1 children)

Ive never understood how the same crowd that spouts not your keys not your crypto would ever trust any password manager they havent personally read the source code for/compiled/self hosted.

Not your server not your safe/secure password

[–] [email protected] 4 points 11 months ago

Because the pop security YouTube crowd goes through great lengths to avoid these conversations which reveal the limits of their own knowledge and abilities. Because a YouTube channel which just says "you are vulnerable to state actors and should focus on protecting yourself from more benign threats" doesn't generate as much traffic as shilling VPNs.

[–] [email protected] 3 points 11 months ago* (last edited 11 months ago)

It's because they don't care about encryption when they can just side channel the endpoints. You can infer device state from observing EM emissions, and in theory observe keys being loaded into the registers under the right circumstances. This has been demonstrated conceptually many times over the past decade, using a wide variety of devices and methods.