• 2 Posts
  • 409 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle

  • I used to be an avid reader but as I got older and busier I just couldn’t find the time.

    Then when I did have time there was always distractions, or other things I could be doing.

    So now I read primarily via audiobooks through Libby and my library.

    I read 130 books or so last year that way.

    Mowing the yard? Audiobook.

    Long drive? Audiobook.

    Waiting at the doctors? Audiobook.

    Dishes? Audiobook.

    And then when I’m really invested I’ll relax by playing some mindless game while I listen. Think match 3 or bejeweled.

    Just engaging enough to keep me from getting bored while listening but not so much that I can’t do both.

    Balatro, BABA is you? Bad candidates for playing and listening.

    The last couple of years I burned through the wheel of time series, all of Brandon Sanderson’s books (except skyward which I haven’t gotten to), a lot of Adrian Tchaikovsky, and others.






  • One thing to consider. When the stocks that are part of a mutual fund drop… then your retirement contributions will be buying them on sale.

    Assuming the mutual funds are spread out to minimize risk (1 of the funds companies folds, etc) overall you’ll be better off long term.

    As you age you’ll start moving your investments to more stable options (talk to a financial adviser on the specifics for your plans). This way they that won’t benefit from huge gains but also are a lot less likely to be wiped out by massive drops.

    In the meantime look at how your funds are doing over time. Not even year to year but maybe every 2 or 3 years.









  • The hassle and delay is part of how it works. If there was a seamless catch all then it wouldn’t be feasible to make it secure.

    Having a second physical factor, as much as it can be a hassle, is much better than any single factor.

    Your password can be breached, brute forced, bypassed if there’s an issue somewhere.

    Your biometrics can’t be changed so anything that breaks them (such as the breach of finger prints in databases, etc) makes them moot.

    A single physical token can be stolen and/or potentially cloned by some attack in physical proximity (or breach of an upstream certificate authority)

    But doing multiple of those at the same time. That’s inordinately much harder to do.

    I will say the point/gist of the article is a good one. The variety of types some used here and others used there does make it a hassle to try to wrangle all the various accounts/logins. Especially in their corporate and managed deployment which isn’t saving passwords and has a explicit expiration of credential cache (all good things)