sebastiancarlos@lemmy.sdf.org to Linux@lemmy.mlEnglish · 5 个月前How To Become A Hacker: A Step-By-Step Guidemedium.comexternal-linkmessage-square19fedilinkarrow-up197arrow-down112cross-posted to: programmer_humor@programming.devprogrammerhumor@lemmy.ml
arrow-up185arrow-down1external-linkHow To Become A Hacker: A Step-By-Step Guidemedium.comsebastiancarlos@lemmy.sdf.org to Linux@lemmy.mlEnglish · 5 个月前message-square19fedilinkcross-posted to: programmer_humor@programming.devprogrammerhumor@lemmy.ml
minus-squareWarl0k3@lemmy.worldlinkfedilinkarrow-up11·5 个月前Fun background info: Trusted Representatives don’t actually carry their shard of the key (to prevent exactly this scenario), they have (iirc) a keycard which allows them to access the secure storage medium where their different pieces are stored.
minus-squareFauxLiving@lemmy.worldlinkfedilinkarrow-up8·5 个月前 to prevent exactly this scenario I’d love to be in the group that brainstormed this exact scenario
minus-squaresebastiancarlos@lemmy.sdf.orgOPlinkfedilinkarrow-up6·edit-25 个月前Every software system worth its salt should have safeguards against Nokia nunchuck attacks.
minus-squareFauxLiving@lemmy.worldlinkfedilinkarrow-up3·5 个月前And now we move on to the second item on the agenda: Advanced Protection against Shrubbery and Why We Need It
Fun background info: Trusted Representatives don’t actually carry their shard of the key (to prevent exactly this scenario), they have (iirc) a keycard which allows them to access the secure storage medium where their different pieces are stored.
I’d love to be in the group that brainstormed this exact scenario
Every software system worth its salt should have safeguards against Nokia nunchuck attacks.
And now we move on to the second item on the agenda: Advanced Protection against Shrubbery and Why We Need It