I don't remember the last time i had a meeting that was productive. Last time i worked in the office, the hallway discussions where the productive ones and now working remote most of the time is just being able to work with good people that understand text and work by messages that works good. Even video meetings with good people tends to be waste of time.
I wonder if it would be possible to allow people to ssh into the edge servers with enough access to verify no access logs are stored but not enough to cause any problems. Admit i have not thought it through but would be cool having people verify the live environment while running.
You can't really verify anything in this way. SSH is just a protocol, you're trusting the SSH server to give you a shell inside the real production environment instead of giving you a shell inside some elaborate simulation of a production environment. It's about as trustworthy as a policy page saying "we don't keep logs".
You are correct. Would need something like distributed ledger to fully prove things.
It might not be possible to verify 100% but the more transparency the better i guess. Seeing the 3 way handshake and connection information, the timings, location of the server. Would need to be quite elaborate to fake. Just thought was a fun idea. Have the customer allowed in to production. A lot more difficult then publish privacy page, source code, fake audit reports.
I love kde and it is what i use but still having the bug from time to time that the panels dissapear and have to relaunch plasmashell, also i wish they merged the virtual desktops and activities into one concept and allowed different wallpapers on each.
The theme settings is also confusing because of gtk apps, global theme etc. Feels everything around theming could be made nicer.
Prob some more nitpicks but overall it is a really great desktop environment.
> I love kde and it is what i use but still having the bug from time to time that the panels dissapear and have to relaunch plasmashell
I have that too, on Wayland. I also had a bug I mentioned recently in another comment with transparent terminals flickering, but that seems to depend on what is behind them and I think is a bug specific to Konsole.
Overall, its very close compared to a few years ago when several things were problematic with Wayland, but I do slightly feel its not quite there yet.
> i wish they merged the virtual desktops and activities into one concept and allowed different wallpapers on each.
> Prob some more nitpicks but overall it is a really great desktop environment.
Trying not to sound too cold, he seemed like a very nice guy and i did not know him. It was not surprising for me. I remember seeing interview with him when he took things very personal and could not let things go some year back. Thought at that time that he was at high risk of suicide. He seemed to have a self loathing personality / depression and obsessive behaviors.
Staying on the Internet and be dependent on it in some way financially working as a streamer with all the short form communication and negativity online. Together with cyber bullies etc. A lot of things creating a perfect storm for what seemed to be a sensitive and very nice guy. Easy to say that his family and real life friends should have seen it too and make him change path but in reality it is difficult.
Especially since things that make it worse like sitting down and playing chess all day / night and not getting enough sleep, together with cyber bullies is also the things that you love, you earn money on and you have many of your friends there.
I asked Perplexity what people are speculating online might have been the cause of his death, and it mostly appears to revolve around mental health issues, substance abuse & self harm. Whether or not it's true, this is a tragic loss. Smart & talented people can often be very sensitive.
Having struggled with these same issues for most of my adult life I'll just say it's nothing to be ashamed of and if you or someone you care about is in pain or struggling, don't hesitate to reach out. There are resources out there for you and it doesn't make you weak for using them.
The most dangerous about the touch screen in my car is a warning message that come up first when the entertainment system boots, warning about using the screen while driving that i need to accept.
Recently got a iphone 16 pro to my mom. First thing i reacted on when opening the package was. Damm that is a thick phone. Compared to my S25 and older android phones i have the iphone 16 feel old and clunky, like from another era.
PCI DSS from 4.0 actually have something called customized approach for everything. If you can prove and the QSA agrees that you fullfill the goal of a requirement, you can be quite flexible. Example i am doing things like not using passwords at all and only passkeys, or only ssh keys protected by hardware security key etc. Together with agents trying to verify the devices connected are company owned and hardened in different ways.
Your milage might vary depending on how good your auditor is but PCI DSS standard do have quite a bit of flexibility in it.
Presumably at some point in your environment you are doing MFA? Just not at every step?
Ie If someone broke into your office, opened computer, inserted the hardware security key, would they get in? Or is there something else non-physical going on? Like the initial login is password + security key, and you can demonstrate the ssh keys never leave the secured PCs etc.
It is not about MFA or not but to demonstrate the process is secure for the purpose.
It can be complicated but a example. TOTP that is very common used with passwords is regarded as MFA (tho most of the time software based on phone) but have many problems regardless
- many time replayable
- can be intercepted
- implementations look different
- recovery code reuse problems
etc.
On the other hand, using only passkeys dont have those problems but with passkeys, many times you cannot decide on what device a user have registrated the passkeys in a enterprise setting. example they could be apple passkeys, chrome passkeys, windows, hardware key(yubikey) etc and all of them behave different when it comes how they ex can be copied/ synced between users devices. So from where they can be used.
So for any authentication flow, you need to look at the full picture. What is the process when credentials are lost? How do user onboard etc.
Is a good entry point to say. We should use MFA or similar but the details matter.
reply