• 4 Posts
  • 135 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle
  • Hatte to be mister smarty-pants here, but empirically if your life was ruined from the start, your chances of recovery through therapy are actually much higher then for someone who ruined it himself/got Ill later on in life.

    The thing is: finding therapy that works for you is a process on its own. You will likely have to try a lot of them to find a good one who has free slots. But you will find one eventually and if you have it does help!

    Just one word of caution: go to to ones who actually have a Dr./major/magister in psychology and are registered doctors.

    I hope you life in a country with good universal healthcare, if so you can just go to a therapist (they offer single sittings for cases like that) and discuss with him what kind of therapy could work for you and what the next address can be.

    I am someone who is not religious and believes everyone should have a free decision if they want to live or not, but my galeart says: man, don’t give yourself up, especially not because of damage inflicted on you by others. All the best from germany





  • You keep referring to concepts like “Keys encrypted with itself” “Tpm are by design encrypted”

    When you don’t really say anything from value.

    Not every “encryption” is the same.

    When we talk about safe encryption we talk about file system level encryption of a system with safe algorithms like aes and a long enough random password (the key). this is safe.

    If you store the key unencrypted on your phone, this encryption is no longer safe.

    If you don’t know the 16 random digit key it HAS to be on the phone and it CAN’T be encrypted “by itself” because you would no longer have any means to decrypt it.

    It could be encrypted with a pin, but again, then its only as strong as the pin, and I don’t know how long an only numeric pin would need to be to withstand modern brute forcing, but I doubt a relevant percentage of people have that kind of pin.

    You can’t explain how this would be safe, so you just come at me with russels teapot and say “well you can’t prove its not safe” (which is true because I’m no security expert, but someone with enough knowledge could certainly) and lash out at me “acting in bad faith” because I don’t jump through your hoops of passive aggressive misunderstanding.

    All I can do is refer to experts, who found things like CVE-2022-20465 - a bug which allowed lockscreen bypass.

    As you could have googled that yourself, but you ask this just to throw me off.

    But if you want to keep using your google android and bitlocker win and feel safe, its not my problem.






  • You are right in a sense of: If the TPM holding the keys were itself encrypted with a strong password, this would be still be considered secure. You are wrong in the sense of: lenovo sells a device, tells its users its encrypted, their data is safe. None can steal their data

    in reality the data can easily be accessed, which could be considered as “cracking the device/bypassing the encryption” because what lenovo prevent was someone ripping your ssd l, but not just decrypt it because the encryption was not implemented securely.

    I don’t want to debate the security of a luks Linux volume or veracrypt windows laptop, (even though even those are in theory vulnerable to highly targeted and skilled things like cleverly exploiting e.g the logofail bug)

    My point isn’t that there are no ways to have a secure system, my point is that the percentage of truly secure systems is low


  • Dude what encryption are you talking about? Hardware storage encryption is just by now getting more widely adapted, the phone I used till a year ago didn’t even support any encryption.

    Sure, aes-256 with secure password only stored in your mind is quasi 100℅ safe, but that is not how most devices handle their “encryption”.

    If the key for the encryption is on the device, and either stored in an unencrypted TPM or unencrypted storage, its not a matter if breaking the encryption (quite impossible) but breaking the software/hardware (quite possible for someone with good enough forensics and skilled programmers)

    Also also: encryption only helps if the device is off, which is seldom the case with phones.









  • Well girocards will give the shop the permission to make a one time withdrawal of the amount displayed on the screen, if that money is in your account. If the money isn’t in your account, the payment will not go through. Also if the shop wants to make a second withdrawal, you need to insert your card again and enter your (secret) pin again, they can’t choose what’s charged an when (only before you insert your card an pin, and only THIS transaction will be authorized).

    Its a pretty secure system, as (as long as the card terminal isn’t hacked) you can’t spend more than you have, you don’t need to trust shops to only withdraw the agreed amount, and they can’t charge you a second time. Also the spending shows up on your account balance normally within 1 or 2 days.

    From what I understand credit cards just let anyone make withdrawals of any amount, as soon as you know the numbers written on the card. So not only you need to trust the shop to withdraw only the correct amount, you need to keep track over you spendings really good, because they could just charge you an arbitrary amount of money on an arbitrary company name months after you gave them your details. Also from what I understand (normal) credit cards just will always work, and if you pay more than you have you just automatically accept a credit contract you need to pay back to your bank. Also (years ago, don’t know if still true) payments get charged to your bank account on bulk at the end of the month, which makes security and not spending to much even harder.