WelcomeWelcome | FAQFAQ | DownloadsDownloads | WikiWiki

Author Topic: Making unphishable 2FA phishable - Matthew Garrett  (Read 1483 times)

Offline gadget42

  • Hero Member
  • *****
  • Posts: 937
Making unphishable 2FA phishable - Matthew Garrett
« on: December 01, 2022, 04:59:25 AM »
Making unphishable 2FA phishable - Matthew Garrett

https://mjg59.dreamwidth.org/62175.html

found via rss feed from:
https://planet.gnome.org
was also posted at:
https://planet.debian.org

sharing is caring

20221201-0403am-cdt-usa-modified-added cross-post post link
« Last Edit: December 01, 2022, 05:03:45 AM by gadget42 »
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Offline gadget42

  • Hero Member
  • *****
  • Posts: 937
Re: Making unphishable 2FA phishable - Matthew Garrett
« Reply #1 on: December 05, 2023, 05:14:24 AM »
didn't want to start another thread so searched for "Matthew Garrett"

Why does Gnome fingerprint unlock not unlock the keyring?
Dec. 4th, 2023 10:17 pm
https://mjg59.dreamwidth.org/68537.html

as an aside, also searched for "fingerprint scanner" and this was the only result:
https://forum.tinycorelinux.net/index.php/topic,26216.0.html

happy holidays all
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html