Forgot your password?
typodupeerror

Comment Re:I approve (Score 1) 124

The major releases are big updates, they move between Ubuntu LTS base versions. Those are every two years. They waste a lot of time with the minor version releases they do. On Mint the minor releases are mostly Cinnamon feature updates. They set up a brand new repo, compile packages for it even if they haven't changed, and do a whole release management things along with complicated "Update Your System" functionality that ends up mirroring a lot of the work they'd need to do for a major release.

LMDE does not do it this way and seems much more manageable. The Mint parts are essentially rolling release, no point releases.

Comment Re:I approve (Score 1) 124

Oh, and they do the complex upgrade thing because the repository for each point release is completely separate. As far as apt is concerned you are updating "zara" packages to "zena" packages even if they are the same. This doesn't affect the whole system, since the Ubuntu stuff stays the same, but adds complexity.

It's another piece that doesn't happen in LMDE. It's all "gigi".

Comment Re:I approve (Score 1) 124

The base is based on Ubuntu LTS, the point releases are primarily larger upgrades of the desktop environment and some of the associated programs. When you change from 22.1 to 22.2, some things will look different.

On LMDE, they don't do point releases - they use Debian Stable and just do the desktop updates periodically without all the fuss. I wonder if they're going to move closer to that model for everything. It would make sense.

Comment Re: Passkeys don't remove the need for 2FA! (Score 1) 52

Itâ(TM)s interesting since the creators tend to think thatâ(TM)s enough. The server is able to verify (and require) through user verification that a challenge was presented and answered correctly by the user. I assume that doesnâ(TM)t protect from the theoretical device that always returns yes, I do not know how they deal with the potential for nefarious authentication devices other than advising people not to use them. I am not a fan of the synced keys that are common with cell phones since it weakens the âno direct access to key materialâ(TM) design and makes key theft more of a potential problem.

Comment Re:Yeah, No Thanks! (Score 1) 230

That's a good point. I am leery of software solutions like phones or password managers where the keys are synchronized (therefore key material is available "somewhere") and potentially vulnerable to yet-unknown attacks. More trusting of the hardware tokens, after some number of failed pin attempts they clear the data. No doubt there are vulnerabilities in their firmware too that will someday be discovered but I'm not a big target, I'll notice if someone steals my keys.

Comment Re:A Passkey is pretty much a client cert... (Score 1) 230

It's not really confusion, they are using FIDO2 with a nicer name and the FIDO2 tokens can store them. A Yubikey 5 can hold 25 of them. This is a change from MFA where the Yubikey generates the response on the fly so there is no limit.

The primary user-visible difference between Passkeys and MFA, is the passwordless "Passkey" implementation locks the keys and the MFA does not. Apple's keychain for example stores both MFA and passwordless certificates as "Passkeys". It can also sync them between devices, although this is worse for security, I think Windows Hello can probably sync them too.

Slashdot Top Deals

What we anticipate seldom occurs; what we least expect generally happens. -- Bengamin Disraeli

Working...