Linux hobbyist, Machinist and tinkerer
Public Key 405B46E81DCCDB2B310DEF0DA5F0B998E8AC3752
- 8 Posts
- 58 Comments
Nah photos, would be better and or theres an app that can import gpg keys from photos. I dont quite remember what it is tho
Thats if the key was uploaded to a keyserver.
Thats a fucking metal idea.
Yeah i realized this after i got to work and lookup up what gpg uses for ascii armor. Its base64, i used base64 -d and i could get some parts of my key. The photo has been updated to remove alot more of the key.
Major fuckup on my part.
But i learned that ASCII armor is base64 i guess.
Yeah qr codes would be the “easier way” But i never scan any of them because MALWARE
You would need to know the whole key to know. If there are blocks missing you cant get anything from a key. And you would half to see in in real life to corelate my user alias to my real identity. Which i originally going to use a key that i have for online accounts (a key for steamy) But i then realized that would then have my online account linked to my real identity
It should be if there is chunks missing its unusable. At least thats my thinking, since gpg is usually a binary and ascii armor makes it human readable. As long as a person cannot guess the blacked out parts, there shouldnt be any data.
Kinda like binary if your missing bits of binary in a program it should be unreadable
Yeah i thought about that! I have been playing with base64 encoding tho!
Specific key for this hat, i wanted to share this idea. But i also wanted to see if any local people would email me. Also didnt want to paste my email adress online LMAO.
Also cause nerd fonts IM ADDICTED
You can use Samba, its built into windows to locally share a file to another conputer ovet LAN
Steamymoomilk@sh.itjust.worksto Privacy@lemmy.ml•Are there any use-case for those SSDs with hardware-based encryption? Is it a good idea to use one of those over software-based encryption?English0·1 month agoFrom going do the rabbit hole with recently learning freebsd. Is that every good brand nvme ssd has a default password for hardware encryption and you can use certain software to change the default encryption key. However basically everywhere i read online said that hardware based encryption is rarely/never implemented correctly. So an attacker still can most likey retrieve data from the ssd, so basically software encryption will always be more bulletproof. Because people can steal your ssd or clone it and all data on it is useless without a header and key. If using full disk encryption, So basically software based encryption will always be alot harder to break than hardware encryption.
Common misconception uggh. You put it on sand to make hands. Duh
Why else would they call it a handitiser
/S
Steamymoomilk@sh.itjust.worksto Privacy@lemmy.ml•Found some Firefox forks but can't decide which one to useEnglish0·1 month agoI use librewolf and arkenfox
Steamymoomilk@sh.itjust.worksto Privacy@lemmy.ml•The Dangers of End-to-End EncryptionEnglish0·3 months agoI love the satire
Steamymoomilk@sh.itjust.worksOPto Selfhosted@lemmy.world•ServerPartsDeals Hardrive failure after 3 days? looking for advice,English1·3 months agogoharddrive
yeah i remember looking at some that had 5 year warrenty but they quickly sold out, and i was itching to build a ZFS pool as i waited for months to finally pull the trigger
Steamymoomilk@sh.itjust.worksOPto Selfhosted@lemmy.world•Wiregaurd split tunnel issues?English2·4 months agoAmen brother!
Steamymoomilk@sh.itjust.worksOPto Selfhosted@lemmy.world•Wiregaurd split tunnel issues?English1·4 months agoi figured it out i had dns in the client wiregaurd config
The meatles 👌👌👌👌👌
Steamymoomilk@sh.itjust.worksto Privacy@lemmy.ml•Tails no longer recommending balenaEtcherEnglish0·5 months agoSudontplease :P
Dammit i read it as DOH in a homer simpson voice in my head aswell!!