Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

[flagged]


Perfect is the enemy of good.

"Secure" and "insecure" doesn't make sense in a vacuum.

The most secure computer is one you never use, but that's not useful at all.


Could you please advise which vuln the yubikey support has? I use that every day.


fact


The most secure system is the system with no features! Let's delete everything. #nofeatures #securityonly


Guess this is it. I'm powering everything down for security reasons. To the woods I go to build a cabin.


They made a netflix documentary about the last guy who did that. He wrote a pretty good manifesto.


Nothing is deleted. Just the default options are now used, as intended and announced upstream.

How should a debian openssh be called, with custom patches to integrate systemd logging, enabling all old and insecure cyphers? Or a debian openssl with all legacy cyphers enabled?


> as intended and announced upstream

Meanwhile, from a maintainer of the KeepassXC repo:

> Good luck to you. Really bad decision. We will be sure to let everyone know.

https://github.com/keepassxreboot/keepassxc/issues/10725#iss...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: