stupid_asshole69 [none/use name]

  • 0 Posts
  • 17 Comments
Joined 8 months ago
cake
Cake day: March 3rd, 2025

help-circle
  • Your only “good” option is yubikey. They’ve been around comparatively forever, have all the problems worked out and make durable hardware. All that matters because you don’t want to get something from a company that goes under in a few years and leaves you high and dry and you don’t want the dongle to break because that’s your authentication, now you’re locked out of your shit.

    I recommend against getting some doodad with a biometric reader. You’re adding complexity, attack vectors and not getting much out of it plus you’re locking yourself out of deniability and the possibility of handing a trusted person your dongle, telling them your password and having them act in your stead.












  • It was the switch to Microsoft accounts. Everyone started using online accounts to login and when people complained apple said “okay, you don’t need to and here’s some ways to make it safer” after some high profile leaks, google said “we’ll anonymize your data so when we use it for tracking it’s not tied to you, also here’s some ways to make it safer” after everyone realized they weren’t not being evil and Microsoft said “are you fucking stupid? It says right there in the tos that we’re gonna take and use everything!”.

    Go to massgrave.dev and start reading. Convert your Microsoft account to a local user account. You will still have a Microsoft account but you won’t use it to login. You will lose access to stuff you bought under your Microsoft account until you sign in. This may or may not be acceptable to you.

    Use your knowledge from massgrave to convert your windows edition to enterprise iot ltsc if you’re on 21h2, otherwise either downgrade or flatten and reinstall that edition. You will now be able to receive security updates and stay on windows 10.




  • Last time I said it was hard to figure out if this was some kind of malice or just someone without much experience/knowledge.

    I been thinking about what this post and the one before it actually are though. They’re not disinformation, I don’t think they’re misinformation although I think that argument could be made if there was actual intent (and a person could also make the argument that there is intent).

    This just kind of seems like white noise or what would be called slop if it were generated by ai.

    It’s not useful in making a decision.

    A vpn is a tool and you use the right tool for the job. A chart comparing the various similarities and differences between a box and open end wrench, flare nut wrench, socket set, power drill, impact driver and torque wrench would be useless for decision making about what tool to buy because they’re for different jobs.

    If you need to take the lug nuts off a truck the right tool is an impact, if you need to replace brake lines you’re gonna use a flare nut wrench.

    It’s not useful to compare pia and mullvad. If all you need is a cheap way to reliably bypass geofencing then pia is the right tool. If you need deniability and trust then mullvad is the right tool.

    It makes no sense to compare air and nord. If you need the cheapest per device service for bypassing content blocks then the tool is nord. If you need port forwarding for torrents, soulseek and usenet all at once then the tool is air.

    The problem with posts like this is that they don’t really provide any useful understanding or decision making process and wouldn’t be useful from an educational perspective like the comparison between various wrenches made above (if it were in some kind of Tools for Dummies publication) because they’re not even contextualized as such.

    A better start for this kind of post would be “here are some reasons to use a vpn service” or “here are some actual important differences between different vpn services apps”, not weather they’re available on Jim’s cut rate Secure I Promise ™ alternative android App Store.



  • 3 is stupid.

    The point of a password manager is to enable the use of multiple different passwords and usernames. The point of using multiple, hopefully unique, passwords and usernames is that when joes website gets breached and their passwords and usernames get leaked because they were storing them in plaintext it doesn’t mean all your accounts everywhere else are now compromised.

    That happens a lot and if you want to learn how affected you are at this very moment just check haveibeenpwned to see what’s osint on your usernames.

    So let’s say you’re appending the classic “monkey1” to your autofilled password manager passwords. You’d be protected from a password manager breach until one of your website logins is breached and someone realizes all your gibberish high entropy passwords have “monkey1” on the end. Considering there are billions of leaked credentials and millions get added each week, that’s kind of like putting wallpaper up so the tank coming through your brick wall has to work a little harder.

    So what would be actual good advice? Key rotation. At some interval, clear your cache, browsing history etc and change all your passwords. Now you’re actually protected from breaches of old credentials and current credential breaches are rendered moot.

    If you read all the way down to here, consider not relying on this community for privacy or security advice. The fact that “stupid asshole” was able to easily articulate why something on the list is a waste of time when no one else has done so should raise some eyebrows.