CardboardVictim

joined 2 weeks ago

Like sure, there are other app stores, but if you're a business I think it would be a mistake to avoid them all together.

I think offering alternatives, and recommending them, whilst still being available on the app store and play store is probably best

Another one could be Quartz. It's basically a static site generator you put on your obsidian vault / markdown files. Their documentation is hosted with it as well.

[–] CardboardVictim@piefed.social 4 points 3 days ago (1 children)

Hmm, I don't think I've optimized it either to be fair. I wanted to use my phone as a 'bridge in between' but that means it uses battery since it 'checks' whats online.

In reality my phone is usually on demand and since I work from home, my work device is usually still turned on when I turn on my 'good computer' with fun projects.

One thing that I find useful is the backup / version control settings, I've set it up that there is a version control if it overwrites things so that when conflicts happen (eg a sync didn't happen and I changed both keepass databases) I can quickly 'merge' them or sync them up manually.

I've also heard that syncthing isn't available on android anymore but a fork (that is somewhat vetted, iirc) exist.

If you can run applications on your NAS & connect to it from anywhere, it could be used as a type of 'master' server that keeps everything in sync that is always online.

[–] CardboardVictim@piefed.social 9 points 3 days ago (6 children)

I too recommend KeepassXC, works even on android with KeepassDX. I use syncthing to sync between devices (work, personal and android)

[–] CardboardVictim@piefed.social 16 points 3 days ago (2 children)

From what I scanned, there was no reason given on why they only attacked cloud based providers.

My guess is that these are paid ones and thus have a 'market share', easier to attack etc.

If you attack a 'keepass' password the attack vector is more crypto / memory based as far as my limited knowledge goes and not some funky inbetween attack.

Also, if you attack a cloud base provides, you will most likely have multiple victims per breach / exploit, whilst offline are targeted and thus not so interesting in most cases unless we're talking about a person of interest

[–] CardboardVictim@piefed.social 42 points 3 days ago (9 children)

For people interested there were 3 cloud based password managers tested and this is what they found

The researchers demonstrated 12 attacks on Bitwarden, 7 on LastPass and 6 on Dashlane.

That's my take as well

Actually pretty funny

I'm at a loss for words. I don't think I could write better satire that's still believable.

That's just terrible, dang.

Not sure about reddit but it was posted on Hackernews too.

[–] CardboardVictim@piefed.social 6 points 1 week ago (5 children)

What's the recruitment process like?

If you explore a bit on the site, I reckon it is. I especially love the directory view

view more: next ›