• 0 Posts
  • 13 Comments
Joined 6 months ago
cake
Cake day: May 20th, 2024

help-circle
  • englislanguage@lemmy.sdf.orgtoFunny@sh.itjust.worksClever guy
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    edit-2
    2 months ago

    How good of a conductor wood is depends on its state. If it is very dry and not salty, this should be safe (although he could have taken the piece of wood more at the end to increase the distance between him and the fence and the length=isolation through the piece of wood). If it is wet and salty, it might be dangerous.



  • Your comment is incorrect in many different ways.

    Butter is fat and some sugar and protein.

    No. The butter in my fridge has almost no sugar (0.6g in 100g) and almost no protein (0.7 g in 100g).

    Pasta is mostly carbs.

    For comparison: The pasta I have at home have more sugar (most have roughly 3g in 100g) and way more protein (12g in 100g).

    they all become calories, and if you eat more calories than you burn, they will be stored as fat.

    Are you sure you’re not simplifying too much?

    Also, “just” eating less or more calories is not that easy if you ignore the side-effects. Carbohydrates will make you hungry very soon unless mixed (or eaten after) fibers, fat and protein. Which you should do anyways for health reasons.









  • It seems like part of your thinking is: Why would a criminal invest effort to attack an average John Doe? The answer is: With a popular (widely used) operating system, the effort goes close to zero. Attacks can be automated, so they will be. Also, even if they are not interested in your data, they will be interested in other benefits they gain from controlling your computer:

    • Computing power e.g. for Bitcoin mining
    • Your internet connection to attack other computers via yours, taking your computer to hide their identity and location. This is commonly done as DDOS for blackmailing businesses or silencing websites. Or for sending spam or fake reviews.
    • Your identity. If they can get your name, they can order stuff on your name, which will get you a bad credit score or even criminal charges (identity theft)
    • Access to your local network. Many devices are easier to hack via local network access than from the internet. A criminal who took control of your computer could for example take over your “smart” appliances or WiFi printer.

  • How would MS Authenticator make it any better than TOTP?

    To break TOTP, the attacker would need to:

    a) be able to observe the initial exchange of the TOTP secrets. To do that, the attacker needs access to the victim’s computer (on user level) at that specific time they set up TOTP. TOTP is a TOFU concept and thus not designed to protect against that. However, if the attacker controls the victim’s computer at that time, the victim is screwed anyways even before setting up 2FA.

    b) have access to the TOTP app’s secret storage and to the victim’s login credentials (e.g. by phishing). If the attacker can gain that level of access, they would also have access to the Microsoft Authenticator’s secret storage, so there is no benefit of the Microsoft app.

    On the other hand, Microsoft Authenticator is a very huge app (>100MB is huge for an authenticator app, Aegis is just 6MB, FreeOTP+ 11MB), i.e. it brings a large attack surface, especially by connecting to the internet.

    I don’t think Microsoft Authenticator brings security benefits over a clean and simple TOTP implementation.