• 1 Post
  • 34 Comments
Joined 1 year ago
cake
Cake day: June 15th, 2023

help-circle
  • I was one of those people. I still maintain hope, but the fear of what the algorithms will do outweighs that hope some days.

    The thinking was that people’s core opinions are formed while they are young. They are mostly inherited from your family and society around you, so that information bubbles are formed early that are hard to break out of.

    I thought that if people were exposed to multiple cultures and ideas from a young age through the Internet, they would understand them better – not just as foreign concepts told to them through a thick lens of bias from their parents and teachers.

    However, I failed to predict the opposite powers. First were the echo chambers that formed, strengthening the deepest dark sides of humanity that, before, were kept locked away in basements lacking anyone with whom to discuss and provide validity. Then the corpos and MBAs figured out they could psychology game us all with algorithms. They didn’t necessarily know at first that the negative content would be the best for driving engagement; but they didn’t care either.

    So right now I think the bad is outweighing the good. But I don’t think it has to stay this way forever.

















  • The definition I learned for web 2.0, as it was happening, was a shift from static web pages generated all at once on the server and delivered to the client whole, to using Ajax with in-browser Javascript dynamically changing already-delivered pages with back-end XML calls.



  • IHawkMike@lemmy.worldtoAsklemmy@lemmy.mlCan I refuse MS Authenticator?
    link
    fedilink
    arrow-up
    10
    arrow-down
    1
    ·
    edit-2
    6 months ago

    We can restrict the use of software TOTP, which is what companies are doing when they move users onto the MS Authenticator app.

    Admins can’t control the other TOTP apps like Google Authenticator or Authy unless they go full MDM. And I don’t think someone worried about installing the MS Authenticator app is going to be happy about enrolling their phone in Intune.

    Edit: And even then, there is no way to control or force users to use a managed device for software TOTP.


  • This is incredibly well said and I agree 100%. I’ll just add that software TOTP is weaker than the MS Authenticator with number matching because the TOTP seed can still be intercepted and/or stolen by an attacker.

    Ever notice that TOTP can be backed up and restored to a new device? If it can be transferred, then the device no longer counts for the “something you have” second factor in my threat model.

    While I prefer pure phishing-resistant MFA methods (FIDO2, WHFB, or CBA), the support isn’t quite there yet for mobile devices (especially mobile browsers) so the MS Authenticator is the best alternative we have.