bdjegifjdvw@lemmy.world to Programmer Humor@programming.dev · 1 day agoI love password based loginlemmy.worldimagemessage-square175linkfedilinkarrow-up11.2Karrow-down123
arrow-up11.18Karrow-down1imageI love password based loginlemmy.worldbdjegifjdvw@lemmy.world to Programmer Humor@programming.dev · 1 day agomessage-square175linkfedilink
minus-squareBCsven@lemmy.calinkfedilinkarrow-up1·4 hours agoTrue dat. But if they compromise your computer the first thing the look for is key files. Like my ssh keys are in a root permission file. Protected from general sight, but if somebody compromises my PC with a CVE on then goodbye keys. At least with hardware key it is removable and requires a button press. So accessing becomes physical access or quantum computer cracking
True dat. But if they compromise your computer the first thing the look for is key files.
Like my ssh keys are in a root permission file. Protected from general sight, but if somebody compromises my PC with a CVE on then goodbye keys.
At least with hardware key it is removable and requires a button press.
So accessing becomes physical access or quantum computer cracking