Some IT guy, IDK.

  • 0 Posts
  • 37 Comments
Joined 2 years ago
cake
Cake day: June 5th, 2023

help-circle

  • You see, I don’t think it would invalidate any laws… I suppose it would be subject to whatever judge is making the call, but I would imagine that any judge that’s rational and logical would take into effect the concept behind the law, not just it’s specific wording as it currently applies.

    I hope that anyone looking at a law, written when that specific body of water was named “the Gulf of Mexico” and determine that, since it was called that at the time of the law being passed, that the law applies to the body of water that is, or was, known as “the Gulf of Mexico” at the time it was written, and the law continues to apply to that physical place, regardless of any changes in name.

    But that might be a bit too logical, and I might be expecting a lot from the US Justice system… Or any Justice system for that matter.





  • MystikIncarnate@lemmy.catoMicroblog Memes@lemmy.worldUnisex
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    1
    ·
    1 month ago

    The best, bar none, engendered public restroom I’ve ever seen was less of a restroom and more of an area. It was basically just a hallway coming from a main area in the establishment. The hallway was lined with doors. Each was a “stall” that was just a closet with a toilet. Full hight doors for privacy. At the far end of the hall was a line of sinks to wash your hands afterwards.

    Now, do I think this is perfect and cannot be improved? Hell no. It’s pretty flawed, but I’ll tell you that it’s less flawed than what most buildings that are open to the public have… Far less flawed. Gendered bathrooms are weird. IDK why people are so adamant about keeping them. I mean, I don’t have a men’s room and a ladies room at my house, do you?







  • This is the issue with the current state of 2FA. It’s either text driven (SMS) or it’s app driven, like the Microsoft authenticator, as an example.

    Often “backups” overlap. Like people will use SMS as a backup to the Microsoft authenticator, when the MS authenticator is on the same device as the phone number for SMS verification.

    Real, actual, good MFA, only has the problem that people don’t keep backup tokens around. If you use a Fido2 keyfob, you really should have a second one that authenticates the same systems the same way, but stored securely away from the one you carry with you.

    In that context, backups are actually valid, because if the authenticator is on your keychain and you lose your keys, you have access via a backup on your phone (TOTP or similar).

    If you lose your phone, you still have your Fido2 key as primary authentication.

    If you lose both, you go and retrieve your backup security key and use that.

    It becomes much more difficult to lose access if you’re aware of the limitations of the systems you use. For me, I use a password manager, for login I have biometrics from my PC, biometrics from my laptop, two security key fobs, and a backup TOTP code stashed away. I also got recovery codes and sent them securely to a trusted friend.

    The only things not using a password from my password manager is my main email, which is used as a backup/recovery email for most services, my password manager itself, and my primary bank. For all of these I use unique, memorized passwords that are not short. Any service that can use MFA has MFA set up, with the only exception being those that only support SMS as MFA. Fuck that. If fido keys are allowed, then I set those up If not, I use TOTP.

    The TOTP keys are backed up and stored securely in an online system built for security for this kind of data.

    I have contingencies on contingencies for my own access, but many people don’t even have one, or even a plan on what to do if things go sideways.

    It’s a phenomenon I’ve noticed a lot, it’s like Rose colored glasses for getting things set up. People like to see how it works and get everything operational and happy, with absolutely no thoughts towards what happens when it fails? How will it fail and what will we do when it does? How do we recover? How do we continue to operate until everything can be put back together?

    They see it’s fancy and works for them, and they’re super secure because they have MFA, but it’s only one kind of MFA, and they only have one of them. But they feel good because they have it.

    Then they act shocked when their single MFA method breaks and they lose their accounts because they’re stupid.


  • I don’t get how this is easier than just having an explorer window open to a folder with the files where the exposed desktop would be.

    But hey, you do you. I’m not about to say that you can’t use your PC like this. I’m not your manager, and you can do what you want.

    Whether I “get” it or not is irrelevant.


  • Story time.

    I was helping someone at work the other day…

    As part of my usual process, I minimized most of what the person was using, because I dgaf what users are actually doing on their computers. I’m only interested in getting the “problem” that they’re complaining about, solved, so I can go home.

    When I finished minimizing everything, I shit you not, this person had two full screens of icons on their desktop. I couldn’t help but blurt out “that’s a lot of icons” they went on to describe how they use their desktop as a dumping ground and they clear the whole thing every few months.

    Since I couldn’t give a single shit about what they do with their computer, I said something to the effect of “alright”, fixed the unrelated “problem” they had and moved on.






  • You’re correct. We’re too busy and couldn’t possibly give any less of a shit what you’re up to.

    The only time we care, at all, is if someone makes it our job to care. Usually management cracking down on some bullshit, looking for a reason to give someone the boot.

    Unless management tells me that I’m supposed to care, I don’t.

    Just please, for the love of all things digital, do not do anything illegal on work computers. I still don’t give a shit that you can or do, what I don’t want, is for you to get caught and I have to do a forensic investigation of your system. That’s a whole pain in my ass that I don’t need.

    In general, do not do illegal stuff, but if you’re going to do anything illegal, think of your IT guy and do it on your own devices.