this post was submitted on 30 Jun 2025
19 points (100.0% liked)

WomensStuff

393 readers
232 users here now

Women only trans inclusive This is an inclusive community for all things women. Whether you're here for make up tips, feminism or just friendly chit chat, we've got you covered.

Rules…

  1. Women only… trans women are women, and transphobic or gender critical talk isn’t allowed. Anyone under the trans umbrella (e.g. non-binary, bigender, agender) is free to decide whether a women's community is a good fit for them.
  2. Don’t be a dick. No personal attacks, no aggression, play nice.
  3. Don’t hate on groups, hatefilled talk about groups is not allowed. Ever.
  4. No governmental politics, so no talk of Trump actions etc. We recommend Feminism@beehaw.org for that, but here is an escape from it.
  5. New accounts or users with few comments may have their posts removed to prevent spam and bad-faith participation.

founded 4 months ago
MODERATORS
 

I'm looking for someone who could do a post on tech safety. So staying safe online, avoiding giving too much data away and anything that you thought would be useful. If you can help comment here or DM me

you are viewing a single comment's thread
view the rest of the comments
[–] BroBot9000@lemmy.world 6 points 1 week ago (4 children)

Damn! Solid advice. Would love to hear his whole spiel.

[–] bacon_pdp@lemmy.world 7 points 1 week ago (3 children)

There is no such thing as a secure computer. You can bury it in cement and drop it in the deepest hole in the ocean. If someone needs access to it bad enough, they will get in.

Computer security is about costs to gain access. If they need physical access, far fewer people can be compromised. If that physical access does not gain them additional access; it forces them to spend man power to compromise more systems physically. Thus making things more expensive.

The estimated cost of breaching a level 1 system should be $100K, a level 2 system $10 million, a level 3 system $10 billion and the root of your trust $10 trillion.

White listing is the baseline standard for software running on your computer. If it is not signed by a level 2 system, then it will not run on your computer. The binary itself is reproducible and your package manager can be used to sanity check the build from the server. Your web browser runs in a container which only has access to your downloads folder with write only permissions and the files will be marked as non-executable (not that it will matter as they can’t possibly be signed). The browser is the tor browser and all traffic will be routed unless you login to your bank account.

I am supposed to use a program called fig to create information for social media accounts. (Name, age, address, username are generated and Keepassxc is to generate a unique, random, strong password and store the output from fig).

If messaging friends, I use signal and if I need extra message security, I am to shuffle a deck of cards and put the order into a program which uses it for sending a “one time message” then give the deck of cards to the recipient.

https://www.schneier.com/academic/solitaire/

Something about one time pads being used for nuclear weapons and submarines and the security of the physical transfer of the one time pads. And embassies getting a hard drive full of just one time pads.

(I skipped a bunch but that is what I remember)

[–] ZDL@lazysoci.al 1 points 1 week ago (2 children)

There is no such thing as a secure computer. You can bury it in cement and drop it in the deepest hole in the ocean. If someone needs access to it bad enough, they will get in.

My SO says the same thing. (He's an electronics engineer who writes the software buried inside devices.) "For every can there is a can opener." He also rants about different attacks, the worst one apparently being a "rubber hose attack". (I think he means people getting tortured to open up whatever it is.)

[–] mauuumauukittycat@piefed.blahaj.zone 1 points 1 week ago* (last edited 1 week ago)

“rubber hose attack” sounds like a move in cuphead

load more comments (1 replies)
load more comments (1 replies)
load more comments (1 replies)