richardjs | 1 year ago | on: Ask HN: Life-changing purchases since 2020? (Under $100 and under $1000)
richardjs's comments
richardjs | 1 year ago | on: Ask HN: Life-changing purchases since 2020? (Under $100 and under $1000)
Voice lessons at the local community school of music. I'm a lifelong musician, but was an almost entirely solitary one. I taught myself different instruments, but I never felt like I could get to basic competency teaching myself to sing. I decided to spend ~$200 for a semester of weekly 30 minute lessons. (The community school cooperates with the local university to offer lessons taught by university students for a low rate.)
My singing improved (more work is needed), but the life-changing thing was getting involved with the local music community. It turns out they have a shortage of piano teachers--I had mistakenly assumed there would be plenty in my town! So I started teaching piano, which had long been a dream of mine. The school also connected me to local performance opportunities that are now a part of my regular music routine. And ultimately, the experience encouraged me to enroll as a (part-time) music student at the university, which itself has been extremely enriching and a tremendously positive community experience.
richardjs | 2 years ago | on: The Humbugs of the World (1866)
richardjs | 3 years ago | on: Cartoonist Tributes to Charles Schulz
Thanks for pointing that out. Would edit if I could.
richardjs | 3 years ago | on: Standard Ebooks
[1] https://standardebooks.org/contribute/producing-an-ebook-ste...
richardjs | 5 years ago | on: RIP Google Reader
What I do miss from the Reader days, though, is widespread RSS support. I wonder if the death of such a prominent RSS reader gave sites "permission" to stop supporting RSS, and pushed RSS into further obscurity. Anecdotally, it feels like RSS is a feature often not carried over after a site redesign.
richardjs | 5 years ago | on: The Rise and Fall of Ambrosia Software (2019)
A while ago I forked a version and changed the braking power-up to be controlled by a button press, instead of always active [2]. It was cool to fix something that always bugged me in a game I played when I was a kid.
[1] https://en.wikipedia.org/wiki/Maelstrom_(1992_video_game)#Le...
richardjs | 5 years ago | on: Free and liberated e-books, carefully produced for the true book lover
[1] https://groups.google.com/u/1/g/standardebooks/c/JdVpCm3ckGg...
[2] https://groups.google.com/g/standardebooks/c/osOEfs5HdLo/m/2...
richardjs | 6 years ago | on: Aviation Is on a Low-Carbon Flight Path
But I do wonder how much power is actually expended at takeoff versus climbing or cruising flight. According to [1], only ~19% is used for both takeoff and climb, so electrifying the runway to save the fraction of the 19% used while in contact with the ground is probably not worth it.
[1] https://aviation.stackexchange.com/questions/47262/how-much-...
richardjs | 6 years ago | on: iPadOS
On the other hand, I can see a lot of people buying (or already owning) iPad Pros and using this feature who might not buy a dedicated device for it.
richardjs | 9 years ago | on: Save PBS. It makes us safer
Different local stations rely on difference funding sources. Stations in smaller or rural markets would have a harder time existing on direct donations alone.
richardjs | 9 years ago | on: Save PBS. It makes us safer
No programming is interrupted, and the only marketing content is typically something like "Brand Flakes is happy to support PBS".
richardjs | 9 years ago | on: Laptop security: Apple vs. [Insert name here]
Also, just to be explicit on the user experience: when you boot the machine, one of the first things the kernel does is ask for a decryption password. If you cannot provide that, the system cannot boot further, because everything but the kernel and bootloader (in /boot) is behind the encryption.
1) So as described above, the storage is always secure, regardless of whether the machine is on or not. The rub is that when the machine is in use, the system is actively performing this decryption/encryption. I'm not an expert on the technical side of it (and it probably differs between implementations), but I'd imagine the OS keeps the decryption key in memory. This is functionally an instance of the "it's got to be decrypted sometime" problem, or a variation of the "analog hole" in DRM. At some point, the user will be accessing a decrypted version of the data, and if the attacker is able to take control at that point, he obtains the data.
Let's say I have an encrypted text file (on an unencrypted, regular system setup). To write to or read the file, I need to decrypt it. Maybe a program takes a password and opens a text editing window with the decrypted data. If I care about the security of that data, I'm not going to leave that window open unless I'm actively using it. I understand that if I leave that window open and someone walks by my machine, they'll be able to see the contents, because I left the data in an decrypted state. But I need to have that window open sometime, because I need access to the file myself. It's the same situation with full disk encryption--at some point the data will be decrypted for legitimate use (in FDE's case, only in memory, but still decrypted), and it's up to the user to protect it during those times.
If you lock your machine (using xscreensaver, slock, etc.) and set it to lock when waking from sleep (and whenever else), the attacker must circumvent the lock program before he can access the machine. Ideally this would not be possible (a lock program that lets someone access the system without the password is not a great lock), but there's always the possibility of some vulnerability.
Alternatively, you can always hibernate your machine instead of sleeping it. Hibernate writes the contents of memory to disk and shuts the machine off. When booted back up, the kernel finds the hibernated memory and seamlessly resumes from where you left off. If you set it up properly, the system will write the hibernated memory to an encrypted partition, so the session cannot be resumed without the encryption key. The downside is you have to type the encryption key every time you resume, and my encryption password is a good deal longer than my normal user account password.
In my own practice, if I'm leaving my laptop at a place I'm more worried about theft, I'll hibernate it. In normal use, I'll sleep it and rely on the lock program. Like I said in the earlier post, though, I'd love to hear if anyone has a better approach, or even an analysis of the security of some common lock programs.
2) I have no direct experience with SEDs, but I'm under the impression they decrypt the entire drive when powered on and the password is entered. Or else, they do the same on-the-fly operations I described above. As such, they would be vulnerable to the same attacks as above. Their advantage is transparency to the operating system and better performance. Also see Wikipedia's description of some of their vulnerabilities: https://en.wikipedia.org/wiki/Hardware-based_full_disk_encry...
3) FDE essentially answers the "how to efficiently enter credentials" question with "at the start, when you first mount the partition" ;). Aside from that, file-level encryption solutions definitely exist, and are commonly used. You can encrypt arbitrary files with the openssl command, and many sensitive files (such as SSH keys) have encryption built into their standard usage (SSH key passphrases). Even when running FDE, I keep a passphrase on my SSH keys, because there's nothing stopping a rogue program from grabbing them during normal computer use. I'd encourage any other extremely sensitive files to have their own protection. To quote tptacek, "FDE does basically one thing for you: it reassures you if your laptop is stolen from the back seat of your car or left in a cab." [1]. Other steps need to be taken to run a secure system.
However, I don't know of a file-level encryption solution that functions exactly as you describe. It would be tricky to implement, for the reasons you described, and others. For example, background programs write to the disk too, and sometimes what they write contains sensitive data. Are you going to enter the key periodically for their use too? And will all these programs play nice with the (comparatively) huge blocking times when writing while you type in the key?
4) Of course, that's the question with any security solution. Many of the Linux solutions are open source, so that's at least a plus, but certainly not any guarantee of security. Short of being a security professional capable of auditing the complete source, you have to rely on project reputation, recommendation, and (ideally) someone else's audit. I'm sure lots of people would like a better answer to this question!
Hope that all helps!
richardjs | 9 years ago | on: Laptop security: Apple vs. [Insert name here]
One standard approach is to set up full disk encryption. A common setup would encrypt every partitions but your /boot partition, so a thief would be unable to access your system if it were powered off. (If you're especially cautious, you can do tricks to protect your /boot partition too, to guard against tampering, but that's beyond the scope of protecting against theft.)
The catch is if the thief steals your powered-on laptop, the system's still decrypted (meaning, the decryption key is still in memory). I'd guess locking your machine is a partial guard (and is what I rely on), but I'd be interested in learning if there's a better method of protection.
ArchWiki has a pretty good overview: https://wiki.archlinux.org/index.php/Disk_encryption. I'm happy to try and answer any questions you have.
richardjs | 9 years ago | on: The strange effects of thinking healthy food is costlier
That said, it's not hard to cook food safely. The USDA publishes guidelines [2], which you can then adjust with your own experience and research. (The guidelines are just guidelines, and lack nuance. For example, chicken cooked lower than 165 can still be safe, but takes longer to pasteurize. [3])
Of course, despite all this, cooking isn't a high-risk activity. People everywhere of mixed (or lax) skills and safety have been doing it for thousands of years, and yet foodborne illness is not mankind's single greatest existential threat.
[1] https://www.cdc.gov/foodborneburden/attribution/attribution-...
[2] https://www.fsis.usda.gov/wps/portal/fsis/topics/food-safety...
[3] http://www.seriouseats.com/2015/07/the-food-lab-complete-gui...
richardjs | 9 years ago | on: Van Gogh paintings stolen from Amsterdam found in Italy
I say all this to quote him writing to his brother: "I cannot tell you how happy I am that I have taken up drawing again. I had been thinking about it for a long time, but always considered it impossible and beyond my abilities." [3]
[1] http://www.vangoghgallery.com/catalog/Drawing/1574/Starry-Ni...
[2] http://www.vangoghgallery.com/catalog/Drawing/1729/Windmills...
richardjs | 10 years ago | on: Why I am pro-GPL
richardjs | 10 years ago | on: Virtual Reality Will Bring Back the Arcade
richardjs | 10 years ago | on: How mosquitos deal with getting hit by raindrops
[1] http://www.accuweather.com/en/features/trend/hail-or-sleet-h...
richardjs | 11 years ago | on: Ask HN: I'm having doubts about LastPass security, what should I switch to?
But could this issue be solved by keeping your computer locked when you're not using it? I understand that might not fit your general computer usage, but it's how I use LastPass, and I certainly wouldn't use the service without locking my machine (reprompt enabled or otherwise--reprompt is turned off for most of my passwords).
You also mention trying very fast autologout policies, but that it gets annoying to have to enter your password twice. My question is, if you're logging out immediately, why do you need the reprompt option enabled at all? If a user can log in, they can certainly reenter the password, so the only thing the reprompt does is annoy you, with no added security.
I don't know your particular computer use, though, so forgive me if what I'm saying isn't applicable.
Plus singing is a pretty personal way of making music, and there can be a lot of social fear of doing it badly. Formally studying it can help with getting over the psychological hump from self-identifying as "someone who is attempting to sing" to "singer".