I only do npm install in a docker container where the project and npm cache is mounted. Gives me a bit of security regarding attacks through post install scripts. (--no-scripts is not an option since I need some of them)
- 0 Posts
- 145 Comments
dbx12@programming.devto
No Stupid Questions@lemmy.world•We always hear/read about Goverments cencoring the internet. What is something that the US is not knowing is being censored?
15·9 days agoSeems like some folks from the SCP foundation got loose.
Just wrap your mouth over the spout and you don’t waste a single drop.
dbx12@programming.devto
No Stupid Questions@lemmy.world•Why have so many services started using single-factor passwordless authentication in the last little while?
2·9 days agoAccompanied by “I can stop any time I want” when buying another domain.
dbx12@programming.devto
No Stupid Questions@lemmy.world•Why have so many services started using single-factor passwordless authentication in the last little while?
3·11 days agoAdding a shameless plug here: Aegis is available on f-droid and allows you to backup your 2FA secrets on your own server (e.g. own nextcloud) in case you don’t trust the default Google authenticator.
dbx12@programming.devto
No Stupid Questions@lemmy.world•Why have so many services started using single-factor passwordless authentication in the last little while?
16·12 days agoTime based one time passwords. Those (usually) six digit codes which get replaced every 30 seconds or so. During setup you copied the secret to your device (usually smartphone) and now your device and the server you authenticate at can calculate the same secret code every thirty seconds.
And the era of SMS, where you had 160 letters and had to be creative to push as much information into them to avoid paying for a second SMS.
As long as the maniac with his model planes isn’t around that should be safe.
What a wonderful phrase!
I assume OP would want to send them upstate to live on a farm or terminate the pregnancy before they are born.
Wikipedia defines it as
Advocates of vibe coding say that it allows even amateur programmers to produce software without the extensive training and skills required for software engineering.
Now if you replace some words you see how absolutely bonkers the idea in general is:
Advocates of aircraft autopilots say that it allows even amateur pilots to fly large airplanes without the extensive training and skills required for commercial pilots.
grabs golf club
That’s why I start my dangerous queries with a broken first word like
ELETE FROM table...and do a proofread before adding the D. Saves you from annoying mistakes either by stupidity or fat fingering the enter key.
Oh so we’re back at Tony Soprano memes?
Aibohphobia
If it were real, we would have proof the scientists are just fucking with us.
dbx12@programming.devto
No Stupid Questions@lemmy.world•Three questions about superpowers, which is the best, and which is the worst?
2·3 months agoAnd suddenly we have a new super villain.
Wow, we gone full circle here. 2FA (the “protocol”, not the application mentioned in the OP) was conceived to increase security by requiring a second factor (not second secret). So we would need the password (knowledge based authentication) and the code generating hardware (possession based authentication). If we stuff all our 2FA secrets into a web service, we efficiently removed the possession factor of the authentication, making it one where two knowledge factors (password for the thing you want to login to and password for the hosted 2FA storage) are sufficient.
dbx12@programming.devto
No Stupid Questions@lemmy.world•Could one legally get a hold of those bank bill dye security dye packs, dye your own legally obtained cash with it, and spend it places? Just to make people suspect you're secretly a bank robber.
1·3 months agoSo you should obtain prop money for that to avoid charges for defacing. But trying to pay with prop money is probably attempted fraud.



Usually in the “lets see how this random project I cloned from GitHub works for my use case” scenario. I want to see how it works and if it would cover my use case before spending time on checking code and dependencies for security issues.