• 0 Posts
  • 62 Comments
Joined 3 years ago
cake
Cake day: June 20th, 2023

help-circle





  • I’ve never seen any interview as invasive as this, but i think simple take home assignments are useful to weed out people who don’t have basic skills for the role, can’t read instructions clearly, and/or don’t care enough for the role. It avoids me spending 30 minutes to an hour interviewing them to just reject them.

    The roles i interview for are mid level devops based, and we’ve found that the best way to do this is to provide the candidate a simple git repo with 2 branches, which can’t be merged due to a merge conflict of two text files; no coding required. Just asking the candidate to resolve the merge conflict and write a README with the steps taken is enough to have more than half of the candidates unable to complete the task. If we interviewed all those candidates first, and then had to reject them, it would probably be 1 full working day per month in aggregate that would be utterly wasted.





  • bamboo@lemmy.blahaj.zonetoOpen Source@lemmy.ml...
    link
    fedilink
    English
    arrow-up
    15
    ·
    4 months ago

    The standard is called TOTP and Google became synonymous with it because they pushed it in the late 2000s for Gmail and have a large user base. Other sites did have systems beforehand, like Paypay which had a dedicated fob, but that was not widely used. Gmail was likely most people’s first experience with MFA and Google pushed their own Authenticator app (and didn’t really advertise that others could be used). As other sites got on board, it was easier to tell people to use the app they use for google to get their code, since you could assume people had the app.

    Basically that made a situation where people who had a different TOTP app knew their app would work with “Google Authenticator” but for those without an app or using Google Authenticator, they were likely unaware of the interoperability and standards behind the mechanisms.








  • MAC address is in the data link layer of the networking stack, and would only be seen by other devices on the same network as you. This isn’t visible to websites you visit (unless you’re on the same subnet), and as TCP packets go through network hops, the MAC address is replaced with with the routers MAC address for each hop.

    The reason for MAC address randomization (standard on iPhone and Android) is not for anonymity to the websites you visit, but is there to anonymize the wifi broadcasts in your general vicinity, like a 30 meter radius. The MAC address is randomized so that broadcasts to check wifi networks while you’re out and about can’t be used to track your physical location.




  • If messages aren’t end to end encrypted, then their contents of the messages can be intercepted by Telegram or any adversary who has access to Telegram’s systems. This is what the US Government was doing with Prism to suck in unencrypted data from ISPs without their knowledge. By not having end to end encryption, you have to trust that Telegram administrators are being truthful when they say they’re not looking at your messages, and that their systems are never compromised by crimegroups or nation states without Telegram’s knowledge.