• 0 Posts
  • 89 Comments
Joined 1 year ago
cake
Cake day: August 25th, 2023

help-circle
  • That assumes that an adversary has control of the browser

    No it doesn’t, if they intercept an encrypted password over HTTPS they can resend the request from their own browser to get access to your account

    The big reason you don’t want to send passwords over https is that some organizations have custom certs setup

    What is the problem with that? The password is secure and only shared between you and the site you are intending to communicate with. Even if you sent an encrypted password, they wrote the client side code used to generate it, so they can revert it back to its plaintext state server side anyways

    It is better to just not send the password at all.

    How would you verify it then?

    If not sending plaintext passwords was best practice then why do no sites follow this? You are literally posting to a site (Lemmy) that sends plaintext passwords in its request bodies to log-in










  • You will probably have waaaay more issues trying to get the windows client working through wine than dealing with any hiccups on the Linux client. It was buggy but passable like 5-6 years ago so I’m sure it’s much better now

    You can try running it through a VM first before making the switch - 3d performance will be horrendously bad, but at least it will give you some piece of mind.


  • If unity gives a different download for each, you would have the best luck with whatever version matches closest (so the 22.04 download on current pop_os). Basically the more system dependencies the program has the more likely you will run into conflicts installing on a mismatched OS, but it isn’t guaranteed to cause problems (e.g. program requires openSSL version 1.2, but my OS ships with 1.1). I think unity just bundles everything with the binary, so it should be fine.

    For what it’s worth, i used it on Ubuntu back when it was still in beta and it was super buggy (the installer and account stuff mostly, the engine itself seemed ok), so hopefully their Linux offering has since improved.



  • lol. Did this in my old building - the dryer was on an improperly rated circuit and the breaker would trip half the time, eating my money and leaving wet clothes.

    It was one of the old, “insert coin, push metal chute in” types. Turns out you could bend a coat hanger and fish it through a hole in the back to engage the lever that the push-mechanism was supposed to engage. Showed everyone in the building.

    The landlord came by the building a month later and asked why there was no money in the machines, I told him “we all started going to the laundromat down the street because it was cheaper”








  • bjorney@lemmy.catolinuxmemes@lemmy.world-----BEGIN PRIVATE KEY-----
    link
    fedilink
    arrow-up
    42
    arrow-down
    18
    ·
    edit-2
    4 months ago

    Words are the least secure way to generate a password of a given length because you are limiting your character set to 26, and character N gives you information about the character at position N+1

    The most secure way to generate a password is to uniformly pick bytes from the entire character set using a suitable form of entropy

    Edit: for the dozens of people still feeling the need to reply to me: RSA keys are fixed length, and you don’t need to memorize them. Using a dictionary of words to create your own RSA key is intentionally kneecapping the security of the key.