I had a coworker who was into them and had quite a collection. I still have some Varsitys sitting around from a joke. Not really into them myself, but notebooks marketed for use with them are really nice.
I had a coworker who was into them and had quite a collection. I still have some Varsitys sitting around from a joke. Not really into them myself, but notebooks marketed for use with them are really nice.
Its funny how youtube has its circles. Tom scott is in the science youtube sphere, with Smarter Every Day (Destin), Technology Connections (Alec), Practical Engieneering(Grady), Stand Up Maths (Matt Parker), Steve Mould, Numberphile, Computerphile, and many, many others.
Tom Scott is Nice in this category as his videos are usually short, to the point, interesting, and weekly. He has some longer form content and game shows on other channels to. Overall if your interested in science and trivia game show youtube, he’s worth a watch. His other channels are Technical Difficulties, lateralcast, and no longer used Matt and Tom.
Interesting game, a bit like geoguesser, but if you can estimate distances well, you’ll get it on the 4th guess through triangulation.
Its an interesting game, but I don’t think I’m enough of a word person to enjoy it. I might give it another shot.
The spoiler syntax here is
:::spoiler display text
hidden text
:::
That’s an interesting take on it. I wonder if that version is “solved”. You reminded me of a 3d version on a really old version of windows. https://tcrf.net/TicTactics
Well they don’t usually. I also think it can be considered a pest in certain areas. And tusks are sort of horns.
bigger than a breadbox?
electronic?
natural?
animal?
mammal?
Domesticated?
live naturally in North America?
live Naturally in Africa?
grey?
Thanks. I now have a streak of 1. I don’t know if its my style, but we’ll see.
⭐ Quizzle 45 10/20
🟨⬛🟨🟨🟨
⬛⬛🟨🟨🟩
I’m familiar with the puzzle type, I’ll have to check out that site. It looks like a good collection. Someone came up with a variant called cross the streams where the shaded area has to be contiguous. The ambiguous clues cause some interesting logic.
It doesn’t matter how good an individuals security is, its the system that’s a problem. Passwords are not often compromised through brute force. Password resets are a much more efficient entry method.
https://pages.nist.gov/800-63-FAQ/#q-b05
Q-B05: Is password expiration no longer recommended? A-B05:
SP 800-63B Section 5.1.1.2 paragraph 9 states:
“Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.”
Users tend to choose weaker memorized secrets when they know that they will have to change them in the near future. When those changes do occur, they often select a secret that is similar to their old memorized secret by applying a set of common transformations such as increasing a number in the password. This practice provides a false sense of security if any of the previous secrets has been compromised since attackers can apply these same common transformations. But if there is evidence that the memorized secret has been compromised, such as by a breach of the verifier’s hashed password database or observed fraudulent activity, subscribers should be required to change their memorized secrets. However, this event-based change should occur rarely, so that they are less motivated to choose a weak secret with the knowledge that it will only be used for a limited period of time.
Q-B06: Are password composition rules no longer recommended? A-B06:
SP 800-63B Section 5.1.1.2 paragraph 9 recommends against the use of composition rules (e.g., requiring lower-case, upper-case, digits, and/or special characters) for memorized secrets. These rules provide less benefit than might be expected because users tend to use predictable methods for satisfying these requirements when imposed (e.g., appending a ! to a memorized secret when required to use a special character). The frustration they often face may also cause them to focus on minimally satisfying the requirements rather than devising a memorable but complex secret. Instead, a blacklist of common passwords prevents subscribers from choosing very common values that would be particularly vulnerable, especially to an online attack.
Composition rules also inadvertently encourage people to use the same password across multiple systems since they often result in passwords that are difficult for people to memorize.
I don’t think you’re following.
First, you are an account holder in my answer not an employee.
Second, the reason its an issue has nothing to do with the actual password or password security. Frequent changes lead to simpler passwords. Someone is likely just to increment a number, so a new password is barley a hindrance if the previous one is compromised. Frequent changes are going to lead to more password resets, service personnel who have to deal with people forgetting passwords due to frequent resets/ changes are more likely to be complacent allowing an attacker to gain access through a reset. For company based passwords, frequent changes and high complexity requirements are more likely to lead to someone writing a password down near where that password is used.
I am generally more annoyed at the second bit, the user having to change their password. Both are problems, but internal policies for changes are usually documented and communicated.
As an example, if you have an online account with some bank. That bank would be the provider.
All I know is the mortgage servicing company I use seems to have started ~3 month interval, that they don’t say (no second factor available either). When I went to pay my internet bill, I get greeted with a message “you’re passwords been reset”. I’m stubborn and I was just using those sites to pay bills, so now I just don’t log in to those anymore.
Insurance, and government need to catch up to the research. For sites that support them, I really like the Yubikey as a second factor.
you and @CodingCarpenter@lemm.ee must use the same system.
I don’t have any first hand experience, but anecdotes I hear, Medical and Banking have some of the worst password/security practices.
I don’t think I’ve gotten past finding the correct length video. Getting that to work with everything else and keeping what’s his face alive is just too much.
Bob Mortimer on WILTY, and I think he did it on Taskmaster too.