I went in to delete mine. Was forced to put in my real name and current employer without any way to opt out. So for a short brilliant moment I was Bobo Bobolicious of Bob’s Boat Oars
I’m gonna go for taking reasonable action of fortification and then try my luck.
And negative, usable security is a delicate balance of security and convenience. It employs various layers of usable redundant security methods that keep things to the best possible and reasonable level of security available, while also maintaining useful defense. If I were doing anything rendering me a target of a malicious actor, that’s a different story. But run of the mill individual passwords for each website/service coupled with 2FA along with password database encryption is enough to keep a nobody like me reasonably comfortable.
Actually, that would make it easier to fall for a phishing page. My browser extension will only offer to fill example.com. If I’m on exarnple.com, it won’t. This makes me say “hmm, why no match for this page? ah! the domain is different”. With a notebook, I’d happily type the password in just the same.
PEBKAC isn’t really an argument greater than a Strawman. If you’re saying operators can’t be trusted to be competent you might as well argue that these people shouldn’t own computers or cellphones, or kitchen knifes or other things that require a minimum competence.
Say what you want about old timers but [ Notebook and Pencil ] has a 100% success rate if the attacker doesn’t have physical access.
Sure, but that’s where the cross platform comes in, because I’d rather not have to lug said notebook around with me.
Convenience and Security are different goals. You can either put security before or after convenience.
I’m gonna go for taking reasonable action of fortification and then try my luck.
And negative, usable security is a delicate balance of security and convenience. It employs various layers of usable redundant security methods that keep things to the best possible and reasonable level of security available, while also maintaining useful defense. If I were doing anything rendering me a target of a malicious actor, that’s a different story. But run of the mill individual passwords for each website/service coupled with 2FA along with password database encryption is enough to keep a nobody like me reasonably comfortable.
Actually, that would make it easier to fall for a phishing page. My browser extension will only offer to fill example.com. If I’m on exarnple.com, it won’t. This makes me say “hmm, why no match for this page? ah! the domain is different”. With a notebook, I’d happily type the password in just the same.
PEBKAC isn’t really an argument greater than a Strawman. If you’re saying operators can’t be trusted to be competent you might as well argue that these people shouldn’t own computers or cellphones, or kitchen knifes or other things that require a minimum competence.
I’m not typing a 64-character random string from a notepad everytime I log in somewhere tho
And an encrypted vault probably has a near 100% success rate even if the attacker has access to it given a sufficient vault password.