Little bit of everything!

Avid Swiftie (come join us at !taylorswift@poptalk.scrubbles.tech )

Gaming (Mass Effect, Witcher, and too much Satisfactory)

Sci-fi

I live for 90s TV sitcoms

  • 15 Posts
  • 307 Comments
Joined 1 year ago
cake
Cake day: June 2nd, 2023

help-circle









  • Those fuckers. 24 hour fitness was mine but same bullshit. Had to call a call center in India which game me the runaround for an hour trying to cancel. Then best of it, they wouldn’t let me cancel my wife’s subscription that was coming off my credit card, said she had to call in and do the same even though it was my credit card and she was standing right next to me.

    Then they had the gall to say I owed at least 3 more months because of what I gather is bullshit.

    That’s the only time I’ve ever done a charge back on my credit card. Fuckers. Best part is the charge back revoked the last few months of payments too, my credit card person was super nice. So by pushing for 3 months extra that they didn’t eat or deserve, it pushed me to charge back and they ended up losing 3 months from both my wife and I, effectively giving us those last 3 months for free.






  • I don’t, specifically because I don’t trust myself to host that. I know what people will say here, but I trust 1pass way more than I could do it myself.

    1pass uses your password plus a secret key to generate your full “password”, meaning you need both to access your vault. The password you memorize, the key you keep safe somewhere (inside the vault is even good, since you probably have it open on another device should you need it). They publish their docs, and show how they encrypt your vaults. To them, your vaults are truly just random bytes they store in blob storage. They don’t store your key, they don’t store your password, they will not help you out if you lock yourself out. That’s the level of security I want for a password vault. If they ever get breached, which hey, it can happen, the most someone will get is a random blob of data, which then I’d go and probably generate a new password and reencrypt everything again anyway.

    Vs me hosting myself, I’m sure the code is good - but I don’t trust myself to host that data. There’s too many points of failure. I could set up encryption wrong, I could expose a bad port, if someone gained access to my network I don’t trust that they wouldn’t find some way to access my vaults. It’s just too likely I have a bad config somewhere that would open everything up. Plus then it’s on me to upgrade immediately if there’s a zero day, something I’m more likely to miss.

    I know, on the selfhosted community this is heresy, but this is the one thing I don’t self host, I leave it to true security researchers.