Jimmy clearly ripped off my website. His website even has my name in the contact information at the bottom! The gall of some people…
Jimmy clearly ripped off my website. His website even has my name in the contact information at the bottom! The gall of some people…
It looks really good, just like one I set up recently myself…
The TOTP feature in Bitwarden works, if you paste in the whole otpauth://
URI to Bitwarden’s Authenticator Key (TOTP) field. The URL specifies that the hashing algorithm should be SHA256. If you just import the secret=
value into Authy, it probably defaults to using the SHA-1 algorithm, which may be why the codes generated by Authy don’t work.
SHA256 is more secure than SHA-1, which I guess is why Lemmy has chosen to use it for its 2FA feature.
It would have to be Gödel’s Incompleteness Theorem. Such a beautiful proof that shakes mathematics to its core.
The science communicator Veritasium made a nice video about it: https://youtu.be/HeQX2HjkcNo
I first learned about it in Douglas Hofstaedter’s masterpiece Gödel Escher Bach: An Eternal Golden Braid
just goes to show: size is relative :-)
Thanks for the resources. I’m old school, and so far haven’t really looked into Rust; I look forward to watching the talk you linked to.
When I compiled that program, the executable was around 10MB. I wrote the same program in C, and the executable was 15kB. That’s about 3 orders of magnitude difference. Is Rust really 1000 times better than C? :-)
Lenny is a national treasure, taking on the telemarketers and bringing them yo tears: https://www.kaspersky.com/blog/35c3-lenny-voice-chatbot/25275/
Then change the title of the post to something open-ended like “How vulnerable is Lemmy to DDOS attacks?”. Taking out a major node which hosts many key communities is going to have an adverse impact.