Wouldn't unlocking the bootloader and installing a custom ROM be easier, more stable and cheaper than buying a niche product that's unlikely to work properly?
What exactly are you looking for? Android IS Linux, do you want to try a different "distribution" just for fun?
The code is still accessible, you just can't use the code search function in the web, which normal git doesn't have anyway.
The latest pixel devices (since 6 I think?) already provide accees to a /dev/kvm
device, so maybe you could even run a normal Ubuntu server VM on your phone for hosting these services.
Are you sure the content is gone? I assume the communities had users from other servers, if so isn't the content replicated on other servers?
I guess he means that raspberry pi doesn't run a mainline kernel
I guess he means that raspberry pi doesn't run a mainline kernel
Arguably, if you use 2FA to access your passwords in 1password, there’s little difference between storing all your other OTPs in 1password or a separate OTP app. In both cases, since both your secret passwords and OTPs are on the same device (your phone), you lack a true second factor. The most likely way someone would gain access to 1password secured with 2FA is if they control your device and it’s been compromised, and having your OTPs separated wouldn’t provide additional protection there. Thankfully, the larger benefit of OTPs for most people is that they are one-time-use, not that they originate from a second factor.
As you said if you have both the password manager and the OTP manager in the same device it goes against the concept of 2FA, and you can throw most of guarantees out the window.
I think one distinction worth making is that the encrypted vault itself is still only protected by one factor, the password. The OTP 1Password asks you is part of their service authentication mechanism. If for some reason the attacker manages to get an encrypted copy of your vault (Via App cache, Browser add-on cache, mitm, 1Password's servers, etc...), "all" the attacker needs is to brute force your password and they can access the contents (Password and OTP seeds) of the vault without requiring the TOPT token. Yes you can mitigate this with a good password/passphrase, but as GPUs/CPUs get faster will that password continue to be good enough in few years time? If your master password becomes "easily" brute forceable, now the attacker has access to all of your accounts because you had the password and OTP seeds in one vault.
If you truly feel you need a second factor though, you’ll probably want to look at something like a Yubikey or Titan. I’ve considered getting one to secure my 1password vault to reduce the risk of a lost phone compromising my vault.
I have one, but unfortunately the amount of services that support U2F as a 2FA mechanism is relatively small and if you want to talk about FIDO2 passwordless authentication even less.
Many password managers use a biometric factor to sign in
The only thing this does is replace the authentication mechanism used to unlock the vault, instead of using your master password (something you know), it uses some biometric factor (something you are), although it uses your biometric data, it's still a single factor of authentication
This basically moves the MFA aspect to one service (your password manager) instead of having each service do their own thing
I am not sure I understood you here. What do you mean by "instead of having each service do their own thing"? Each website using their own method of delivering OTPs?
It also comes with the benefits of password managers - each password can be unique, high entropy, and locked behind MFA.
I am not discrediting password managers, they have their uses, as you mention you can have unique, high entropy password on a per service basis. The only thing I am against is the password managers themselves also doubling as OTPs generators (take a look at Bitwarden Authenticator which kinda defeats the purpose of OTPs. From the perspective of OTPs it makes much more sense to use a separate application (Like Google Authenticator or Aegis Authenticator), preferably on a separate device, to generate the OTPs.
That’s not quite right though, there’s the factor you know (password to your vault), and the factor you have (a copy of the encrypted vault).
That would be true for offline vaults, but for services hosted on internet I don't think so. Assuming the victim does not use 2FA on their Bitwarden account, all an attacker needs is the victim's credentials (email and password). Once you present the factor you know, the vault is automatically downloaded from their services.
This is something I hadn't thought until know, but I guess password managers might(?) change the factor type from something you know (the password in your head) to something you have (the vault). At which point, if you have 2FA enabled on other services, you are authenticating with 2 things you have, the vault and your phone.
Although it's true that you are increasing the attack surface when compared to locally stored OTP keys, in the context of OTPs, it doesn't matter. It still is doing it's job as the second factor of authentication. The password is something you know, and the OTP is something you have (your phone/SIM card).
I would argue it is much worse what 1Password and Bitwarden (and maybe others?) allows the users to do. Which is to have the both the password and the OTP generator inside the same vault. For all intents and purposes this becomes a single factor as both are now something you know (the password to your vault).
test comment
Any chance to get a guarantee on lm.put.tf ? The instance is only used by people I know to avoid trigger happy admins on larger instances that defederate for trivial reasons. There are no real "communities" there and currently there's only 5 users with just 2 being active on the fediverse. The admin account there goes largely unused to prevent the instance from being compromised due to XSS and/or CSRF attacks,
There is only one community for meta discussions about the instance so that other people may publicly raise issues to be discussed. Unsurprisingly, no one has posted there yet.
I think the admin of c/selfhosted is the admin of Lemmy.world
Made my own for myself and some friends. We couldn't be bothered creating account on the larger instances and have power tripping admins de-federating instances over trivial issues.
1000/400 mbps down/up for 40€ /month. Portugal
I think those kind of vulnerabilities are pretty rare, though.
Not really... If you go read the security bulletin from google, you will see every month that there are a couple of issues fixed on closed source components https://source.android.com/docs/security/bulletin/2023-07-01
Also vulnerabilities related to kernel code, I highly doubt most ROM "developers" are actually backporting security fixes for that specific device's kernel branch/source.
You can update your phone with custom ROMs, but it won't update the closed source components of it(device drivers, bootloader, etc...). If a vulnerability is found in one of those components, it's unlikely that it will get parched
Is this post getting federated?
I'm running an instance for me and a couple of friends at https://lm.put.tf/. I've noticed that there seems to be no consistency whether or not post images are mirrored in instance's pictrs
For example:
The post https://lm.put.tf/post/22176 from !lemmyshitpost@lemmy.world has its image mirror from https://sh.itjust.works/pictrs/image/92ec8e81-1f05-4ff7-8ec7-f3bdee3d8087.jpeg to https://lm.put.tf/pictrs/image/747826a6-281f-4b1b-8ba2-7bbf452916dd.jpeg
However the post https://lm.put.tf/post/22060 from the same community, but posted by a user from lemmy.blahaj.zone does not have a mirror on my instance. The image links to https://lemmy.blahaj.zone/pictrs/image/OpIT86L1vq.jpg
Why is there a difference in behaviour? is it because the post was done from another instance and not lemmy.world? What is the replication/mirroring logic?