bdjegifjdvw@lemmy.world to Programmer Humor@programming.dev · 2 days agoI love password based loginlemmy.worldimagemessage-square159linkfedilinkarrow-up11
arrow-up11imageI love password based loginlemmy.worldbdjegifjdvw@lemmy.world to Programmer Humor@programming.dev · 2 days agomessage-square159linkfedilink
minus-squareBCsven@lemmy.calinkfedilinkarrow-up0·22 hours agoTrue dat. But if they compromise your computer the first thing the look for is key files. Like my ssh keys are in a root permission file. Protected from general sight, but if somebody compromises my PC with a CVE on then goodbye keys. At least with hardware key it is removable and requires a button press. So accessing becomes physical access or quantum computer cracking
True dat. But if they compromise your computer the first thing the look for is key files.
Like my ssh keys are in a root permission file. Protected from general sight, but if somebody compromises my PC with a CVE on then goodbye keys.
At least with hardware key it is removable and requires a button press.
So accessing becomes physical access or quantum computer cracking