• 0 Posts
  • 27 Comments
Joined 2 years ago
cake
Cake day: August 17th, 2023

help-circle

  • At the risk of sounding snarky, why is this a deal breaker? I can recover both bitwarden and my email if I was ever in a situation where I forgot one or both passwords. It also only occurs in a situation where you are signing into devices that you’ve never logged in to or purposely logged out of. I do use 2FA, but even if I did not it sounds like a lot of complaining about a situation that you should already be prepared for. Bitwarden could easily go down or your password vault could be corrupted or (at worse case) your vault compromised and passwords stolen. Make plans for such situations and you’ll realize this is mostly a knee-jerk reaction to a non-issue.



  • I don’t live in NY but as I understand it, they had to offer this service to every qualified individual. They most likely didn’t have the option to only support certain or just existing customers.

    Think of it this way: Had ATT the option to exclude, they would have and abuse it as much as possible. They can’t, so either they follow the law or take their business elsewhere. Leaving paves the path for another company or cooperative who does want to follow the new laws, rather than having ATT undermine at every opportunity. It hurts in the short term, but in the long term it helps. NY isn’t the first place to chase big telcomm out.



  • I’ve also been involved in something similar. It costs a lot to expand infrastructure. Part of my job would be to plan and explain the costs associated with that. Wireless still needs a wired connection, and wireless still has connection limitations. You can’t just add more users and expect things to work. And you can’t just plop another receiver without it interfering with the others. It needs to be properly planned and something as simple as a building’s signal reflectivity can mess an entire project up. More towers, more equipment, more redundancy, more personnel, more cables, more power, and forking all the money to do all this within the time limit or face fines is a huge task. And that’s assuming it could even work on a technical level, sometimes you just can’t do things (don’t want to interfere with FAA requirements and such) and people don’t understand.

    I hate ATT too, but from a purely financial and planning point of view, I’ve been there. You can’t just snap some fingers and make things happen just like that.


  • This sounds very much like what I read about how pilots on the front line rest. They would spend a lot of time in the air, and anytime there was downtime you took it. Some kind of research went into it and they came up with an entire process that would involve relaxing your body from head to toe, and then visualizing yourself somewhere else, like a boat in a lake or relaxing on a hillside. If you fail, you do the whole thing over. With enough training your mind becomes very adaptive and you can fall asleep faster and in highly disruptive environments. I believe it also had roots in meditation, where the more you do it the easier it gets.



  • Pretty much, the only caveat I’d add is the assumption of ‘right of way’. You can have situations where road conditions were unusual but drivers are not certain to all the conditions. The involved parties can all assume they have the ‘right of way’, when in reality the best option would have been for everyone to yield until conditions ARE certain.

    I’ll give a personal example: I once came upon an accident on a bridge, and the cop cars were already on the scene. It was night, raining hard and the cop cars were facing the oncoming lane with headlights set to high. I couldn’t see anything past the cop cars, so I slowed down from 50 to 25. As I passed, I briefly saw a shadow of a person and heard them say “SLOW DOWN”. I still have no idea how close I was to hitting them, but they must have been very close to hear them thru the rain and sirens. I should have gone much, much slower, maybe even stopped. Fortunately, nothing bad happened, but I had assumed that since the one lane was open that it was ok to use. I don’t know why the cop cars oriented themselves in a way to blind oncoming drivers, but had something happened, the fault would have ultimately been mine regardless.

    Another example is parking lots, so many accidents occur at busy locations. People forget how you are not supposed to block ingress (to prevent traffic backing up into the street and making things worse) and get road rage because they can’t leave. I’ve seen people try to “squeeze in” and end up blocking an entire lot because they can’t move. One side will say “zipper” (ie: “my turn for RoW”) the other will say “right of way”, and parking lots are notorious for not having any signs.

    Edit: and ofc, old ladies who think blinkers give them RoW

    Edit2: an example for cops: blowing thru red lights without making sure intersections are clear. To be fair, everyone should yield to a cop car in the performance of their duties, but this doesn’t mean cop cars get a free pass for RoW and can plow thru full speed, damn the consequences. They still have to take safety of others in mind and yield if required.

    Edit3: because I’ve had the discussion before. Yes, it’s semantics. RoW and FTY are the same thing. I’m only saying the phrase is being sunsetted, no Judge wants to hear someone say RoW. Some laws even use them together as “Failure to Yield Right of Way”. The goal is to prevent the mindset of entitlement, to make sure the clarity of safeguards remain in place.



  • A note, not all states operate this way, but the concept of ‘right of way’ is going away. Judges do not like the idea of someone feeling privileged enough to make a situation worse. In general, they want to implement fail-safes and not fail-unsafe situations.

    Edit: To add - we’ve actually had this for a while, it’s called ‘failure to yield’. The switch is actually being more driven by emergency services making things worse, which is kind of relieving given the general sentiment. Unfortunately it’s just another phrase for the same thing, semantics…but if you do go to court, you’re better off presenting who failed vs who’s entitled.







  • asmoranomar@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    2
    ·
    edit-2
    5 months ago

    Pagers are not guaranteed to be 1 way comms and bringing them into secure locations is a security violation. Additionally, depending on the classification, no unauthorized and undisclosed devices of any kind would be permitted, including any electronics or electronic media such as tapes, CDs, discs, etc. Even when I was issued a verified 1-way pager, I was specifically briefed I was not permitted to bring it into a classified location. Most of the highly classified SCIFS are shielded anyways, you can’t use it inside so it’s safer to leave it out, along with all other devices.

    If your organization allows it, then (if federal) they are breaking the law and should be reported/up-channeled. If it’s corpo, you should bring up additional concerns with your security team.

    Edit: Also, it goes without saying, current events are probably a good reason why pagers (and other devices) aren’t allowed in classified areas. While most focus on disclosure (getting out), we must not forget the risk of data/operations getting destroyed.


  • In some instances of private/public key systems, this is done. It’s mainly for the purpose of ensuring the recipient knows who the sender was and also ensuring the sender knows who the recipient is.

    Quick primer: If you encrypt with your private key, everyone knows it was sent by you. If someone encrypts with your public key, they know you will receive it. Use your private key and someone’s public key together and you know only that person got it.

    In practice, lately another step is added to negotiate a third temporary/session key. This ensures keys aren’t used forever, and if compromised a new one can be generated. This is more secure than encrypting twice, because you never know what data is sensitive and picking the wrong one requires the attacker to start from scratch.