• 0 Posts
  • 140 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle




  • That’s a good way to put it.

    I’d personally amend it to this though:

    Math is the language we use to write pseudo-code for the rules of the universe. It allows us to reasonably predict and share/write our understanding of the universe.

    The best algorithms then match with the actual universe even if the real thing doesn’t use the math (looking at you -1, infinite points and black holes)




  • Marketing Consultant: No, King Condiment, you can’t put red in red on an ad. They won’t see it. They’ll wonder why you’re selling a gun to shoot at food.

    The King: But it’s great advertising!

    Marketing Consultant: No, that’s not a great marketing ad.

    The King: But they can still use red for ketchup right?

    Marketing Consultant: Of course. And your instructions can tell them which is for which.

    The King: It’s so confusing!

    Marketing Consultant: It is. And if you had hired us before manufacturing millions of these we could have told you about using another base color with red and yellow grips and triggers. But you didn’t and so here we are.






  • The hassle and delay is part of how it works. If there was a seamless catch all then it wouldn’t be feasible to make it secure.

    Having a second physical factor, as much as it can be a hassle, is much better than any single factor.

    Your password can be breached, brute forced, bypassed if there’s an issue somewhere.

    Your biometrics can’t be changed so anything that breaks them (such as the breach of finger prints in databases, etc) makes them moot.

    A single physical token can be stolen and/or potentially cloned by some attack in physical proximity (or breach of an upstream certificate authority)

    But doing multiple of those at the same time. That’s inordinately much harder to do.

    I will say the point/gist of the article is a good one. The variety of types some used here and others used there does make it a hassle to try to wrangle all the various accounts/logins. Especially in their corporate and managed deployment which isn’t saving passwords and has a explicit expiration of credential cache (all good things)