• kamen@lemmy.world
    link
    fedilink
    arrow-up
    10
    ·
    1 day ago

    Joke aside, it’ll only work implying that they have to use the same computer. Anyone tech savvy enough will know that it’s trivial to put an unencrypted drive in another machine and read it.

  • madame_gaymes@programming.dev
    link
    fedilink
    English
    arrow-up
    160
    arrow-down
    1
    ·
    edit-2
    2 days ago

    Absolutely perfect. I was traveling with a friend and we decided to watch a movie I had on my hard drive. Once I booted into i3 and I had to use a couple key chords to navigate, they said, “Your computer gives me anxiety.” 😂

    Same person almost shit their pants when I replaced youtu.be with yewtu.be in a URL to get a region locked video to play. I am a bonafide hacker in their eyes.

    • sp3ctr4l@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      1
      ·
      edit-2
      22 hours ago

      My idiot brother, who fancies himself a tech guru… because he reads the news marketing around the tech specs of new console releases every couple of years…

      Legitimately thought I was hacking into our own ISP when I opened a terminal infront of him to configure a VPN setting that didn’t yet have an option to do so in the GUI.

      Lile he tried to have an ‘intervention’ with me over it.

      For … running a few commands to check my existing and active network interfaces, then glancing at a webpage and starting the vpn process with an extra flag or two.

      I was completely unable to convince him that I hadn’t done anything even remotely close to like pen-testing the local DNS server… which is what he… seemed? to think I was doing?

      Gotta love incredibly overconfident + incompetent people.

      I have also had people at cellphone shops either get angry at me for mentioning outloud, or try to hide the fact that you can plug a phone with a broken screen into a usb hub, and then their own keyboard, monitor and mouse, in certain situations, and be able to log in to the phone to do inane parts of their recovery or migration processes … when your screen is borked, but the phone itself is still functional.

      I had employee guy laugh at the notion this would work, another guy say sure you can try it, and then got angry that it worked, and another act like I was performing some kind of dark magic that the other customers in the store could not be allowed to know about.

      EDIT: Oh I forgot to mention the abominable absurdity of my brother trying to give me an ‘intervention’ over anything, at all, ever.

      See, while I was studying the blade getting two simultaneous bachelors degrees from the best Uni in the state, he was going to raves, giving himself serotonin shock syndrome, all while functionally being homeless.

      Multiple times in my life I have had to drop everything I was doing and prevent him from carrying out a very credible suicide threat, or save him from ODing.

      Myself on the other hand, … uh, no nothing like that, and I’d not even given him an ‘intervention’ after saving him from an OD or two.

      Anyway, I’m fairly sure I could drive him back to drug use if I somehow forced him to learn how some of the R code I used and wrote for statistical analysis actually works, or the same for any of the insane spider webs of 200, 300 line custom, one-off SQL queries I often had to write in various data analyst positions before they let me restructure their DBs a bit into something less insane.

      • madame_gaymes@programming.dev
        link
        fedilink
        English
        arrow-up
        3
        ·
        22 hours ago

        Yeesh. I relate fully to the brother part. Mine also likes to pretend, but at least isn’t that oblivious about the terminal. Intervention, though?! LMAO

        “Friends don’t let friends Gentoo”, or something

        • sp3ctr4l@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          edit-2
          21 hours ago

          He has an extremely thin skin, a massive inferiority complex, somehow has worse social skills than myself, despite me being autistic and him not… I could go on, but I already added more in an edit to my above post.

          So anyway I went no contact with my entire dysfunctional family (they’re all this magnitude of nuts but in their own special ways) years ago rofl, my mental health has never been better.

    • confusedpuppy@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      75
      ·
      2 days ago

      I was installing Alpine Linux on a Raspberry Pi 5 and was using the kitchen TV as a temporary monitor. My parents thought I was sending encrypted messages. I was just updating the repository list to find the quickest mirror.

      It’s funny to me how some people see text scrolling by on a screen and immediately think witchcraft.

      • madame_gaymes@programming.dev
        link
        fedilink
        English
        arrow-up
        44
        ·
        2 days ago

        I used to do something similar when I was working in embedded systems, specifically because my superiors had no idea. I would just put our OS up to compile on repeat so one if my machines was always spitting out nonsense (but vaguely related to work).

        “Sorry boss, just waiting on the new build to finish up so I can start on that.”

        • Warl0k3@lemmy.world
          link
          fedilink
          arrow-up
          17
          ·
          edit-2
          2 days ago

          Used to keep a terminal sesh up that was just scrolling top on the dev server whenever I felt like being lazy while looking productive. Took my very tech savvy boss a couple months before he finally noticed.

          • madame_gaymes@programming.dev
            link
            fedilink
            English
            arrow-up
            18
            ·
            2 days ago

            I’m pretty sure the VP of engineering knew what I was up to, but I think he also understood that I didn’t get paid enough to be as neurotic as he was and I generally got stuff done ahead of schedule any way.

  • Photuris@lemmy.ml
    link
    fedilink
    arrow-up
    112
    ·
    2 days ago

    Ok, so I happen to be the paragon of security through obscurity.

    1. Linux
    2. Sway
    3. Dvorak layout
    4. Mechanical keyboard c̄ blank keycaps

    Come at me bruh

    • ewenak@jlai.lu
      link
      fedilink
      arrow-up
      20
      ·
      edit-2
      2 days ago

      As I’m French, I do the contrary: international QWERTY layout on AZERTY physical keyboard. I want to switch to an ergonomic layout like ergo-l though, but it’s hard to learn.

  • cygnus@lemmy.ca
    link
    fedilink
    arrow-up
    34
    ·
    2 days ago

    This is like me when I try to use my wife’s iPhone. Where are the buttons? How do I exit the app?

  • Bappity@lemmy.world
    link
    fedilink
    English
    arrow-up
    14
    ·
    2 days ago

    multi step authentication flows that are customizable for each user would be kinda cool if that doesn’t exist already.

    not too crazy like two factor authentication, just patterns or puzzles to arrange in different ways.

    so every time someone tries to access an account, the authentication process is different every time

    • Fizz@lemmy.nz
      link
      fedilink
      arrow-up
      15
      ·
      2 days ago

      It opens up a page of my handwriting and it must be translated in order to unlock the computer. Even the most powerful linguist in the world couldn’t crack it.

  • mazzilius_marsti@lemmy.world
    link
    fedilink
    arrow-up
    14
    ·
    2 days ago

    Sway is fine. I still prefer i3 because I still use many X applications.

    Now for this meme specifically, sway and i3wm are actually easy to understand once you know the basic key chords. Sway in particular can also allow drag and drop to tile manually without shortcuts.

    Dwm though is a nightmare for Linux beginners let alone those who never use Linux before. I3 needs a .config file, so newbies can read it and figure out the key bindings. On Dwm? It doesnt need one because the system can just run the compiled dwm executable. So if you really want to make it more secure: configure dwm to your likings => compile it => delete the source folder. Nobody will know wtf is going on, except you.