• 0 Posts
  • 52 Comments
Joined 3 years ago
cake
Cake day: June 11th, 2023

help-circle




  • I’m not seeing anything that’s not a great look about requiring strong authentication for access to sensitive portions of a users account. What you’re saying is akin to calling it a bad look that they force users to use complex passwords against user wishes.

    I’m not sure what “trust me bro, my cloud is safe” has to do with anything. Passkeys live on your device. There are ways of facilitating device to device migrations of the keys if you want. You don’t need to use them to use passkeys. And at least on Android you don’t need to even use Google to manage the keys.

    Most semiconductors are closed source. The processor, ram, and radio are also more than likely closed. The software interfaces to all of them have open specification and implementation. There’s like, six for Linux. Microsoft open sourced theirs.
    Tpms are not security through obscurity. They are obscure, but that’s not a critical component to their security model.

    What they do isn’t really what “collecting biometrics” implies. They’re storing key points in a hashed fashion that allows similarities to be compared. Even if it wasn’t encrypted in a non-exportable way you still can’t do anything with it beyond checking for a similarity score.

    You’ve done a good job explaining what I said previously: there’s sometimes a disjoint between privacy and security concern, and so sometimes people don’t understand something about security.


  • That’s close enough for a privacy perspective. There’s also limitations on domains that can request the auth, specifically ”only the one the credential is for", and there’s a different key per domain and user typically.
    It’s also implemented in a way where if the user doesn’t choose to disclose their account to the service, the service can’t know.

    Caring about privacy and caring about the details of a security protocol are distinct. You’d be surprised how many people who care about privacy are deeply wary of passkeys because of the biometric factor, which is unfortunate because the way it authenticates is a lot harder to track across domains by design.

    I understood they had a lot of concerns, one of which was biometrics via passkeys since GitHub was a very early adopter due to the supply chain risk they pose.





  • Some countries have more consumer protections than the US does, and consumers from there are wary of the lack of assurances a lot of us products have.

    To them, it’s like being told you have to pay for your food at the restaurant even if they mess up your order and you don’t get to eat it. It doesn’t matter that the waiter probably isn’t going to drop your food on the floor, throw it away and then give you a bill: the fact that they could makes you not want to go there.

    Likewise, your watch will almost certainly not break via factory defect after more than a month, but the expectation is that if they sell you something it’ll either last the expected lifetime or be suitably replaced or refunded on failure.

    We’re used to our particular blend of capitalist hellscape, so a company saying they’ll replace things if they’re obviously broken the moment you buy it, but beyond than you’re out of luck just seems normal. It’s on us to make sure they don’t mail us subtly damaged microelectronics and tiny lithium bombs.


  • It’s really not new age reconning, the old testament literally has angels and other quasi devine entities in it. It’s not that they thought the foreign gods were demons, it’s that they had stories from their own religion that involved other gods.
    Previously, it was common for nations and tribes to have their own God that they worshipped.
    A segment of the Israelites believed that their national diety was best God, but not only God, because that would be silly. Everyone know El, Ashera, Yahweh and Marduk all exist, but Yahweh is first amongst the pantheon, or that Yahweh was actually the same as the other god but just used a different name for reasons.
    When political strife broke out with Babylon that sect gained prominence and shifted towards monotheism as a rejection and denunciation of the Babylonian gods, both as a middle finger to Babylon and as a bolstering of national identity: preserve the culture by saying it’s not just that this is your God, or that’s it’s the best God, but that it’s the only God.
    The difficult part is the thousand years of stories and belief making it extremely clear that there are other deities. So those stories warped and recontextualized those gods as evil gods or lesser good gods, errr… Demons and angels. A perfect, all powerful, all knowing god who created everything has special helpers to do things for him and has an adversary who is somehow able to resist him, but is also a companion, or a betrayal. Baal. Or is is baelzebub? Samael? Satan? It’s so tricky to keep track of which came from early Judaism and which is a syncretism from a neighboring religion.

    You slightly underestimate how broad the world of the Israelites was. They lived in tribes, but those tribes had a diety different from a neighbor tribe that they still recognized as “them”. Different households would have their own God, and the nation as a whole had a patron God. They lived in areas with enough traffic and people that other gods wasn’t a weird notion. Their interactions with Babylon are a significant recognized historical occurrence, and Babylon had a population of more than 200,000 by modern estimates during the relevant time period.

    It’s confusing to say that it’s ignoring the social control aspect of religion to recognize that they weren’t monotheistic at the time the ten commandments became part of the religious canon. It took a thousand years for them to switch from a subset of the Canaanite religion to a distinct monotheistic one.
    The purpose wasn’t to stop people from making their own gods, it was to stop people from saying any of them were better than Yahweh. It is not a subtle set of rules.

    It’s a coherent argument built on the flawed premise that the interpretation of the text as applied to modern Judaism is the same as it was applied to the proto-judaism of 3500 years ago. We have ample evidence that it would not have, and that time has changed the interpretation and, in some cases, the actual words, like the written form of Yahweh that would be pronounceable in their language being changed to an honorific and subsequently lost to time.


  • It’s less to stop worshipping fake gods, or asserting they’re monotheistic, it’s a directive to stop saying any God is “better” than Yahweh. At the start, it was a religion based on worship of Yahweh as the foremost diety, and eventually that started to include taking attributes from the other deity’s in the pantheon, and eventually saying they weren’t really gods, but spirits, demons or angels. Lesser devine entities strictly below Yahweh. Add in a couple centuries of linguistic drift and religious practice and you’ve got yahwehs name being replaced with “the LORD” in many places to avoid invoking the special power of names, and his name becoming your word for deity, making translation an absolute mess.
    It’s not linguistic trickery to cast the “no other gods before me” as being a polytheistic belief. At the time it was and they only thought one god was worthy of worship.



  • There’s a principle in security, https://en.wikipedia.org/wiki/Kerckhoffs’s_principle, roughly summarized as “the enemy knows the system”. It’s the notion that you should be able to fully describe everything about your system except the secret key and still be secure.

    My concept is a bit like this (don’t wanna give it all away):

    That’s always a concerning thing to encounter at the beginning of a description. That implies that there’s an awareness that if you knew how the system worked it would be weaker, which in a security setting is considered a very notable defect.

    If we’re looking at the actual security of the system you describe through that lens, the name of the company doesn’t add to your security. Neither does your word substitution rules. The secret in your system is the passphrase and the number you’re using to modify the letters from the company name.

    Now, using a passphrase is good, but it kinda felt like you were implying that you use the same passphrase for all services and then modify it. That’s not a good idea, since it reduces your effective security to a single number.
    Additionally, a passphrase should be random words, not a known phrase. If the phrase is grammatical it reduces the security pretty fast since it’s weirdly easy to guess word sequences.

    Adding a character to the end of a password during rotation is also a bad idea. Anyone breaking a password database will automatically try with a series of characters tacked onto the end specifically to catch that, so a password of yours that got leaked years ago can be used to figure out your current password just by checking it with different endings.

    A better system would be to write a truly random password down on a sheet of paper along with 31 others. Now fold up the piece of paper and put it in your wallet.
    You are already adept at keeping paper in your wallet secure, and anyone not in physical proximity to you has to fall back to the usual tricks to get at your stuff.
    Better yet would be to use a password manager, ideally one you can export to something you carey, encrypted, with you while you go.


  • Uh huh. When was I rude? You started by calling me ignorant, and I just asked you some questions about your system. You seem extremely defensive, since it seems to take only the smallest disagreement for you to dismiss someone as ignorant, lacking common sense, and unable to hold a discussion. Take a breath, and try actually explaining your system so there can actually be a discussion of what is or isn’t wrong with it.

    I’m not looking for a fight, but I am extremely skeptical of your scheme because it’s one that people bring up often, and it’s never done in a secure way. Maybe yours is, but there’s no way to know if you don’t actually say what it is.





  • Okay. You’re still doing tech support either way. I have no way of knowing how much free tech support you’re willing to give, hence my caveat of how much you’re willing to support them.

    Netflix would disagree. People feel like they’re supposed to be getting access to a service, and if they’re not getting it they’ll complain to the nearest party to what isn’t working. In this case that’s you or Netflix being asked questions about why the router isn’t working.
    That it’s wrong or irrational has nothing to do with who’s getting asked the question, and who’s the first line of troubleshooting when the service doesn’t work.

    If people didn’t ask the wrong people questions, Netflix wouldn’t need support articles on how to reset your router.