• 0 Posts
  • 16 Comments
Joined 1 year ago
cake
Cake day: June 16th, 2023

help-circle
  • The politicians in charge of making the laws often lack the understanding needed to make privacy respecting laws. So it’s possible, it’s just not happening. They also listen to actual experts ready to little, but do listen to lobbyists.

    This also doesn’t address the censorship side of the problems.

    Just for a random example, literally the first thing I thought of: let’s say there’s a youth movement to affect climate change, or some other issue. They organize general protests, boycotts on “bad companies” and are starting to get somewhere (politically and affecting the bottom lines of these companies). This is coordinated using some online communication platform, think Reddit, lemmy or whatever (Facebook, whatever). Those that want it to “go away” can just include that in the list of sites that fall under thes “youth protection” laws.

    Then there’s laws like that being extended it abused to do things that weren’t originally intended, which is also hard to safeguard against. Future legislation might extend the age range from 16 to 18, then to 21. With the list of blocked sites also growing conveniently alongside, and boom you got a nice censorship platform. Not saying that will happen, but making sure it can’t is what’s hard.


  • This sounds good on paper until you realize that what is considered “social media” is up to whoever happens to hold that position. Even ignoring the fact that it’s unenforceable anyway, unless you require a real ID, wish is just straight up worse for all sorts of reasons.

    The idea is nice, but actually putting it into law without opening the door to censorship and other side effects is just not plausible.

    Edit: also, Everytime you read about a poll like this, ask yourself: what was the question they asked? Did it provide any context? Did it require any understanding of the actual underlying issues and laws? Or was it some variation of “think of the children”?



  • Creat@discuss.tchncs.detoTechnology@lemmy.worldAll the other brands went along
    link
    fedilink
    English
    arrow-up
    25
    arrow-down
    5
    ·
    edit-2
    9 days ago

    If you got that kind of money to spend on a laptop, sure. I really don’t.

    Edit: to be clear, I know this is a stack of Mac’s in OPs picture, but the development that the entry models have basically no ports at all is a more recent development. Having to pick the pro just to be able to connect your stuff without dongles or hubs is a bit insane considering the price (and price difference).












  • Well I thought this was kinda obvious what I meant, but I guess not. What you say is a requirement (sms recovery of a cloud account) is just one of many solutions to your specific problem. I’ll just list off a few solutions below that involve neither SMS (the most insecure communication method in common use today) and only optionally a cloud account. For cimplicity sake I’ll stick to Aegis, where you can create password-protected local backups you can then put wherever you want. This password needs to be very strong for obvious reasons: I would recommend a long sentence (40 characters or more) that you can just remember, like a quote from a movie/tv show/book/poem or something, including normal punctuation as a sentence for example.

    Solution 0: This is more of a trivial solution I wouldn’t actually recommend. You can allow account recovery via eMail and have your eMail not use 2fa, but a long/good password so you can login from memory (see above). This is probably more secure than SMS for the recovery-case, but less secure for the everyday use case of eMail, therefore “not recommended”.

    Solution 1: USB Sticks are tiny, as in the size of a USB port (slightly longer but slimmer for USB-C). If you want to have a backup “on you”, I’m sure you can find a place where it wouldn’t get robbed with the phone/wallet. A tiny pocket somewhere, a string around your ankle, make a compartment in your shoe, or just have it with your luggage at the hotel. I’m sure you get the point. You get your new phone, you plug in the USB, you install Aegis and restore the backup.

    Solution 2a: Dedicated “online” storage. This can be self hosted, or a free account of any cloud provider, but the important part is that it does NOT require 2FA and you do NOT use it for anything else. You have the backup in there. It also needs a very secure password (again: long, but easy to remember, no garbled letter nonsense), but obviously not the same as the Aegis-Backup. So you now need to remember 2 long passwords. You get your new phone, you log in, get the backup and proceed as usual.

    Solution 2b: If not having 2FA is not an option for the solution above, you can have a friend/family store the 2FA on his phone. To log in, you go to the login page and enter your password (which your friend doesn’t need to know), and you ask him over the phone for the current 2FA-Code, which he tells you and you can log in, download the backup and proceed as above. I assume such a high security isn’t that critical, since you have been using something involving SMS. Restore then goes as per usual.

    Solution 3: Store the whole backup with a friend and when you need it he just temporarily puts it somwhere you can access, and removes it again after. Since the backup is protected by a monster of a password, and the accessibility is temporary anyway, this isn’t security critical.

    Solution 4: If you absolutely must, you can find a cloud-provider for 2FA, and use it only as the “first stage”. The only 2FA code in there is the one you need to get access to your main online storage/account where you then have your real Aegis-Backup and/or other files. Obviously this service would need to allow you to login without 2FA, and the usual password rules resulting fom that apply. You can just add the 2FA of your primary service to more than 1 app or service, or if it allows for this, you can generate multiple authenticators so you can also revoke them serperately if needed.