Remix.run Logo
xingped 4 hours ago

Cool. Everyone's threat model is different. As long as we're not writing passwords on sticky notes attached to the monitor, I don't think there's any need to be throwing stones.

pyrale 2 hours ago | parent | next [-]

> Everyone's threat model is different.

Everyone's threat model is different, but some are better than others, and maybe we shouldn't equate taking time to explain why with throwing stones.

lachiflippi 3 hours ago | parent | prev | next [-]

Sensitive data written down on a sticky note is arguably more secure than that same data sitting on an unencrypted hard drive, at least in a home setting.

Glohrischi 4 hours ago | parent | prev | next [-]

I did not throw a stone, i only clarified my counter position for others to understand why I encrypt.

brookst 4 hours ago | parent | prev [-]

Hey now, I use rot13 on my sticky notes.

loneboat 4 hours ago | parent [-]

Gotta bump that encryption up - rot26 is twice as secure.

harshreality 3 hours ago | parent [-]

Secure rot* variants require UTF-8 and mappings that shift characters between {1,2,3,4}-byte encoded-character-sizes. That varies the message length, which prevents any message-length or traffic analysis.

The Snowden leaks revealed that the NSA is flummoxed on how to tackle variable character lengths. However, they've cracked rot26 using custom ASIC supercomputers, so it should be considered insecure even though it's twice as good as rot13.