sebastiancarlos@lemmy.sdf.org to Linux@lemmy.mlEnglish · 4 days agoHow To Become A Hacker: A Step-By-Step Guidemedium.comexternal-linkmessage-square19fedilinkarrow-up194arrow-down111
arrow-up183arrow-down1external-linkHow To Become A Hacker: A Step-By-Step Guidemedium.comsebastiancarlos@lemmy.sdf.org to Linux@lemmy.mlEnglish · 4 days agomessage-square19fedilink
minus-squareWarl0k3@lemmy.worldlinkfedilinkarrow-up10·4 days agoFun background info: Trusted Representatives don’t actually carry their shard of the key (to prevent exactly this scenario), they have (iirc) a keycard which allows them to access the secure storage medium where their different pieces are stored.
minus-squareFauxLiving@lemmy.worldlinkfedilinkarrow-up7·3 days ago to prevent exactly this scenario I’d love to be in the group that brainstormed this exact scenario
minus-squaresebastiancarlos@lemmy.sdf.orgOPlinkfedilinkarrow-up5·edit-23 days agoEvery software system worth its salt should have safeguards against Nokia nunchuck attacks.
minus-squareFauxLiving@lemmy.worldlinkfedilinkarrow-up3·3 days agoAnd now we move on to the second item on the agenda: Advanced Protection against Shrubbery and Why We Need It
Fun background info: Trusted Representatives don’t actually carry their shard of the key (to prevent exactly this scenario), they have (iirc) a keycard which allows them to access the secure storage medium where their different pieces are stored.
I’d love to be in the group that brainstormed this exact scenario
Every software system worth its salt should have safeguards against Nokia nunchuck attacks.
And now we move on to the second item on the agenda: Advanced Protection against Shrubbery and Why We Need It