As a countermeasure to this, you can 'pepper' your passes or secrets with reserved letters / symbols that only you know about. For example if a pass is
_SOSECRETOMG!_
You simply omit the exclamation symbol, and reveal the real pass which is:
_SOSECRETOMG_
That's a very basic example, and can be made as complicated as your brain will allow. The older you are, the harder this gets to do small byte flips like this.
One of the features of KeePass is that you never see or type an actual password. You simply hit CTRL-C to copy the pw to memory and paste into the form. This is a guard against key loggers and visual snooping.
A mental inventory of bloggers who routinely say they did not hand over their HD unlock keys to Apple haunts my mind after reading this. Apple are one of the few tech companies who could throw money at the crypto debate and win some Internet Points, but they would have to counter the claims of many bloggers who said they don't trust Apple to guard their unlock keys
Trusting a company to provide a good client-side encryption implementation and trusting a company to safely hold encryption keys in escrow are two completely different issues.
I wouldn't hand over disk encryption keys to Apple no matter how much I trusted them, purely because they're in a form where Apple could access them without my intervention, and they could conceivably be legally forced to hand over those keys by some government entity in the future.
Apple's argument against decrypting iOS devices hinges on the fact that they don't retain those keys, and therefore can't decrypt them for the government.
It depends on what you mean by 'key' though. In escrow situations, there is the likelihood of a very strong key provided by Apple, and a horrendously weak key provided by the person. What gets a pickle from me is that Apple have some carte blanche reason to involve themselves remotely in U.S sanctioned soil to then intermediate the decryption.
Huh? AFAIK, the only keys which Apple currently holds in escrow are FileVault 2 recovery keys, and those keys are normally only released by request of the user, in the event of a lost local password (the recovery key's used in place of the user's key, not in addition to it). Apple isn't "intermediating" any decryption at any time, because that happens locally on the end user's machine.
FileVault 2 recovery key escrow is also completely optional-- you don't have to send a key to Apple at all.
There's quite a few programs like this, and I've tried them all. What makes this look promising is the peeps behind Cyberduck fame are creating it. I always wanted that feature in Cyberduck, where you can mount any arbitrary legacy file system. All the others I've tried are half-baked attempts and horribly buggy.
A very simple example is that of Google which gives you a Wikipedia summary of a topic, but that's too simple.
In your case you are looking for some way to heatmap certain keywords, or even the tone of a piece of content. You could go further and see the context of the content (which is presumably some form of document which can be parsed).
There are innumerable things online to do this. My first port of call is to trawl Github and find a repo on there which does this.
Just be careful of online services which are hoovering up your query and making off with your data...
My blog http://blog.higg.im/ sits on a private NGINX server and is proxied with a CDN to address traffic spikes. I used to think my blog didn't get that much traffc and a CDN seemed like overkill. I never liked serving a site from the raw Apex IP because it's too easy to boot offline (DDOS'd).
Well this depends on whether the firmware has been scrutinized and hardened over time, similar to how Yubikeys just get better and better. FIDO and other initiatives are more secure because they have more eyeballs on them
Fraud filter is my Occam's Razor for this one. When it comes to any sort of e-commerce always use a 'Kosher IP' or an IP which is not tunneled in some way. 3G/4G/5G? Sims are perfect for this.
'Internet' and 'rules' in the same sentence is a contradiction in terms. The web was not designed for the kind of draconian oversight you see in the EU and elsewhere. Anything that resembles some form of rigidity will be made less rigid and force startups to 'think differently' and more fluid. It's a form of present shock (as Rushkoff has coined) which people are not used to that you see in bustling Shoreditch and other tech melting pots. You actually have people who look like The Internet in those places with USB flash drives as necklaces...
Well said. The most industrious are those who live their lives by some form of checklist, and manage to at least check some of the items off. The only problem I have with checklists are those who obsessively try to achieve each task on the list and presuming each item is somehow not complete unless the others are completed.
A little known phrase that should be tattooed inside their skulls is "opportunity cost" which I learned from Mark Manson's blog, and it is a great phrase. Try to read "No you can't have it all".
Mozilla Addons to the rescue once again. I am always surprised at how under appreciated plugins like these are. If I ever stumbled into money, I would pay it forward to all the developers who feverishly code these plugins for the betterment of humanity and the web.