Internet and computer security

Passkeys still a work in progress.
For example
Amazon doesn't support any passkey device that only stores data locally on a pc.
It asks you if you want to save your passkey on Windows Hello, but always prompts for a USB key.
In reality it will only save on Google password manager or Apple iCloud Keychain or a USB key.
I just got off the phone with Amazon and after some time they confirmed it. They want to use a cloud service, which I'm not in favour of.
Agreed . The only interaction I have with the "cloud " is looking up and watching them float by..........far too many data breaches just to name one obvious reason.
 
That article is very hard to read. With all the ads bouncing around the words jump up and down. The writer can't seem to stay on track. Why he needs 6 sections to explain it is beyond me. As far as I can tell Passkeys are basically public key/ private key encryption much like https websites.
 
Last edited:
That article is very hard to read. With all the ads bouncing around the words jump up and down. The writer can't seem to stay on track. Why he needs 6 sections to explain it is beyond me. As far as I can tell Passkeys are basically public key/ private key encryption much like https websites.

I didn't see any adds or pop-ups personally. I posted the link mainly for the information of those that aren't at all familiar with Passkeys . Not necessarily for those already familiar with it. And of course like many articles online the longer the article the more adds they can display hoping for revenue generating clicks .
I know, I know, but my VPN blocks the majority of adds , lol. True story.
You mentioned before about Amazon offering Passkeys but not with on device storage which isn't great for sure as it introduces another weak link . I did notice on my Galaxy S24 ultra that if you use a Passkey for your Samsung account login that it is stored locally on the device. Same on my Galaxy S11 tablet. Hopefully we will see more of this in other situations.
 
Worth a read for those that care about digital security .....getting pretty scary out there . Given advancements in AI capabilities it's a good time to review ones personal data protections . For example most people bank online.....
I believe that Deep fakes are the biggest threat to the uneducated. They are getting way more sophisticated.
As long as a computing system is not vulnerable to a hack then no matter how fast a quantum computer is it still requires the harvesting of encrypted data. If the encrypted data is not available then it's not vulnerable.
 
I believe that Deep fakes are the biggest threat to the uneducated. They are getting way more sophisticated.
As long as a computing system is not vulnerable to a hack then no matter how fast a quantum computer is it still requires the harvesting of encrypted data. If the encrypted data is not available then it's not vulnerable.
If unencrypted data is gathered there is obviously no need for decryption . All systems are vulnerable to being compromised . Even air gapped systems have been compromised although the attackers have to be in relatively close proximity to the system. I believe that Israeli researchers have accomplished this but it's not common by any means. At the end of the day it all depends on the skills and tools available and deployed by the attacker and defender. The average user is basically defenseless if attacked by a skilled bad guy .


This is both fascinating and scary at the same time. I suspect you are at least familiar with it if you have ever played around with any Linux distros .


I'm sure you're aware but many aren't that anyone who is running a professional version of Windows has the option to use Bit Locker Encryption which as the name implies encrypts all of your hard drives and depending on how the OS was installed may be enabled by default. Problem is most aren't aware and Microsoft for some reason don't make it clear that if you don't keep a copy of your access code/key/password outside of the machine you could lose access to everything. Good idea to retrieve it and keep it safe .

You can lose access to data on a Windows computer with BitLocker enabled if you forget or lose the recovery key or password, as BitLocker uses strong AES encryption that renders data inaccessible without it . Hardware changes like swapping drives, BIOS/UEFI updates, or disabling Secure Boot/TPM can trigger recovery mode, locking the drive until the key is entered .
 
I think i was just reading a deep fake. half way through it was deleted lol...
Lol. Being edited due to my fat fingers.......kinda spooky though eh ? I hope it's good info but most don't give a flying fork l suspect. Most people install deadbolts the day after they are robbed :rolleyes:
 
If unencrypted data is gathered there is obviously no need for decryption . All systems are vulnerable to being compromised . Even air gapped systems have been compromised although the attackers have to be in relatively close proximity to the system.
Air gap systems can only be compromised by physical means unless there is wifi enabled on the systems. To me it's stupid to do that.
 
Air gap systems can only be compromised by physical means unless there is wifi enabled on the systems. To me it's stupid to do that.
Well I was surprised as well and it almost sounds like science fiction but it was accomplished by the Israeli researchers as I mentioned. They are some of the best in the world . I'm sure you have heard of the Stuxnet Worm . That was the Israelis .

Covert Data Exfiltration Malware can leak data using side channels like electromagnetic signals from cables (e.g., SATAn via SATA), sound waves from speakers or fans, or even thermal emissions. Quantum scanners might detect power signatures of hidden air-gapped servers.
 
Well I was surprised as well and it almost sounds like science fiction but it was accomplished by the Israeli researchers as I mentioned. They are some of the best in the world . I'm sure you have heard of the Stuxnet Worm . That was the Israelis .

Covert Data Exfiltration Malware can leak data using side channels like electromagnetic signals from cables (e.g., SATAn via SATA), sound waves from speakers or fans, or even thermal emissions. Quantum scanners might detect power signatures of hidden air-gapped servers.
Most good air gap rooms are sealed.
All the techs wear tin foil hats! ;)
 

Users who are viewing this thread

Back
Top