• 0 Posts
  • 15 Comments
Joined 2 years ago
cake
Cake day: December 25th, 2023

help-circle

  • No it doesn’t. Because it’s not an opinion but a description on how to not get into the situation you’ve described - i.e. about personal security.

    What I’ve described prevents a link between you and your online actions - that’s the whole point. It’s the defense against surveillance and can be applied on situations with way higher risk than just a fine.



  • “most of them are (if advertised heavily)” is quite a claim without data to back it up.

    At least for the one I tested none of them sent additional traffic over my connection. That’s just one data point and I only looked to ones with port forwarding but still far away from your claim.

    There are a shitload of VPN tests out there and testing id your connection gets used by third parties for not traffic is even possible for a layperson.

    Please stop fear mongering without remedies or specifics.




  • That’s an utterly ignorant statement.

    To expect others, often volunteer, to take such a personal risk because the legislation in one part of the world is utterly fucked. How about expecting the people who actually live in the country and state and have a chance to influence those laws to step up their game instead of trying to tell third parties to take individual and personal consequence.



  • The answer is a clear yes.

    In short: Choose your tool that will suit you throughout your degree and really dig into it and learn it now while doing your paper.


    Long version:

    This is absolutely common and I’m not aware of a text editor which supports footnotes but doesn’t support automatically numbering and referencing.

    In latex there’s actually a \footnote that takes care of that. In libre office, if I recall correctly, it’s Insert -> Footnote and I’m sure there are templates with the proper formatting and font sizing already in place.

    Now it sounds like you’re quite early in your higher degree career - depending on your goals and future challenges you might want to either go the easiest route or really dig into writing-based formatting: It’s just faster if you’re typing all the time to not switch to a mouse to inert footnotes - but only if your really used to it.




  • As I don’t know your parents I can just project from myself: Whoever would be the physically closer one at that precise moment.

    I can’t imagine a situation where this could be a rational decision unless one of you fucked them over in a way I can’t even begin to fathom.

    This is so deep monked brain territory that it really comes down to pure instinct and that is driven by perceived higher chance.

    If the situation is in a way there it’s impossible (for example would have to carry both of you but you’re too heavy) chances would be high that we’d all die together - not because of some heroism bullshit but simply because I know my inner monkey quite well and it’s self preservation instinct vs kin preservation are … Let’s say not in my favor ad an individual :D



  • Sorry if I use the wrong English terms! I think you are right :) With system I refered to the literal computer system the file is saved on. I’m not a dev of one of those tools but I know several maintainers and developers that’s why I’m a bit sensitive there! Thats why I (baldy apparently, apologies!) tried to focus on the developer point of view and ignored the whole cost/benefit aspect which you described very well - thank you for that!

    Back to my point re/ local security because I feel this is the only one where I see a fundamentally different assessment between us: (Fontext: access an unencrypted file on my machine): I’m not aware of a mechanism to read (unencrypted or not) files on a host without a preceding incident. How else could your files be acessed? I don’t understand how I might have this backwards.

    You’re completely right if course that there are a lot of tools out there one could use - but it would be on the developer to implement support for those. If you support one you can be damn sure users shout for “I want to use Y”. And then you would still need a Fallback for anyone not willing to install a supported third party tools.


  • Cybersecurity works inherently with risk scenarios. Your comparison is flawed because you state that there is an absolute security hygiene standard.

    That said: I highly appreciate your approach to the subject, i.e. looking at the code and raising a discussion about something that looks wrong. Thank you for that!

    On the subject itself:

    There are two common ways to implement token management. The most common one I am aware of is actually the text based one. Even a lot of cloud services save passwords as environment variables after a vault got unlocked via IAM. That’s because the risk assessment is: If a perpetrator has access to these files the whole system is already corrupted - any encryption that gets decrypted locally is therefore also compromised.

    The second approach is to implement the OS level secret manager and what you’re implicitly asking for from my understanding.

    While I agree that this would be the “cleaner” solution it’s also destroying cross platform compatibility or increasing maintenance load linear to the amount of platforms used, with a huge jump for the second one: I now need a test pipeline with an OS different than what I’m using.