Yet companies are still pushing 2FA over the PSTN. IMO, it’s worse than no 2FA since some companies have processes that essentially trust the outcome as a full validation. I can’t think of a less secure channel.
Yet companies are still pushing 2FA over the PSTN. IMO, it’s worse than no 2FA since some companies have processes that essentially trust the outcome as a full validation. I can’t think of a less secure channel.
I forgot my bags at the grocery store, so I told the clerk I’d like to buy one of their expensive plastic bags. She denied they had plastic bags anymore. I explained polyester. She was shocked.
People have no clue. Nylon, PVC, PET, spandex, and the most insane, vegan leather. Turns out, polyurethane is not made out of vegans.
The year is about right. I didn’t lose my DOS partition, but I was already familiar with partitioning. Someone gave me a Slackware CD set. Had a lot of difficulty getting a higher res than 640x480 with my VLB video card.
Started a BBS at the time, switched to OS/2 Warp, which worked awesome until Windows apps moved to the new Win95 requirements. Started using RHEL for a while, but eventually Debian, then Ubuntu, and now PopOS.
It’s been a long journey, but now Windows 11 is the weird OS that needs hours of troubleshooting and tweaking and adjustments. It’s just not worth the effort, so I keep an Windows 10 VM around with Office for the odd occasion when I need it.
“With regard to the algorithms used to hash data – particularly SHA-224 and SHA-256 – Buchanan expressed surprise that neither will be approved for use beyond 2030.”
Sounds like corruption to me. Hey gov’t pal, let’s make crazy requirements for security due to a quantum boogyman so I can sell you consultants and all new equipment with insane processing capabilities for a shit ton of money. Look for the greasy palms.
Decades of research and we are at 100 qbits and estimates are bouncing around that estimate it will take millions. Once we build them, job #1 will be reading government email?
Maybe, but it’s a lot easier just to use backdoors, software bugs, spies, and good ol’ bribes.