Hearted Youtube comments on Ask Leo! (@askleonotenboom) channel.
-
146
-
54
-
37
-
33
-
20
-
16
-
14
-
13
-
You're preaching to the choir, Leo! And yes, you can have an Amen. The topics you just discussed have been among my biggest passions for at least a couple decades. I'm a skeptic who advocates skepticism, a critical thinker who advocates critical thinking, a nuanced thinker who's complained numerous times about what I call binary thinking (which is an analogy you should be able to appreciate), and a researcher who does his best to avoid confirmation bias and all the rest.
People make fun of me for the amount of time and effort ā and yes, money ā I invest to get at the truth and whole truth of a topic, whether it's buying a big ticket item, choosing a political candidate, or investigating a news story. And some criticize my default position of skepticism on any new information. Yet some of those same people, skilled though they might be at making quick decisions, are egregious spreaders of manure. I'm all about facts, evidence, and reason, which is one of the reasons I love and admire science. I've been banging the drum for a long time about getting more of this into politics, and into the education of our youth, starting not in college but in elementary school. I'm aware of my own human imperfections, and no doubt sometimes they still slip through, but I've been aware of rampant misinformation on a plethora of topics for a very long time.
Thanks for being another voice on these matters. I knew there was something I liked about you when I started reading your articles about personal computing many years ago. š
11
-
9
-
9
-
9
-
9
-
9
-
7
-
7
-
6
-
6
-
6
-
6
-
6
-
6
-
5
-
5
-
5
-
5
-
5
-
5
-
Leo, I downloaded this video, and saved a copy to an external mechanical hard drive, a USB flash drive, a DVD, a CD, LTO tape, reel-to-reel tape, and 51 floppy disks.
I could not find punch cards.
I made 7 sets of everything, to bury a set on each continent.
I am considering making additional sets, for each of our oceans.
And I might make one more set, and place it on Funk & Wagnalls' porch.
5
-
4
-
4
-
The tricky part that's not covered is how to generate this random passphrase. You need a wordlist from somewhere, and if that wordlist exists then it's available for hackers. In my experience wordlists have been quite short too, 2048, 4096 words are common, or 7,776 (diceware) but often much less than the 30K. And sometimes it's unknown: I use bitwarden and it has a passphrase option that defaults to 3 words, from a maybe 4096 word list, it has caps (first letter only option, which just doubles the entropy) a preference for separator and options to put a digit in. Maybe 10^15 at most. So, definitely room for user error if doing this, much more than random chars.
4
-
4
-
4
-
I've been using multi-word passwords for years now. I hate using intercaps but I do mix in things other than common English words. Rarer English words from more obscure parts of my vocabulary. Words from other languages that I know a sprinkling of. Character names from movies, anime, books, etc, that I like. What I call "pronounceable non-words" (EG blipple, bingdinka, bobbotop, and whatever else springs to mind in the moment). Plus a small dusting of numbers just to add some spice to the password.
Every password of mine is unique and none are really guessable from knowing any others, nor even from knowing my password making rules. My main threats are, as this guy says, someone getting a hold of my password directly. From phishing, breaking into the password storage, keyloggers, etc.
4
-
4
-
4
-
From Microsoft Terms of Service: Your Content.Ā Many of our Services allow you to create, store or share Your Content or receive material from others. We donāt claim ownership of Your Content. Your Content remains yours and you are responsible for it.
From Google's:1. Your Content
Google Drive allows you to upload, submit, store, send and receive content. As described in the Google Terms of Service, your content remains yours. We do not claim ownership in any of your content, including any text, data, information, and files that you upload, share, or store in your Drive account.
4
-
4
-
My history as an old geek :
the more reliable storage I had tested :
1-Cassettes, I have cassettes from the early 80s (ZX Spectrum, C64) still working perfectly for nearly 9/10.
2-5.25 floppy disks, 7/10 still working
3-HDD drive, 6/10 and also incompatible formats or hardware protocols/connectors (RLL, MFM, early IDE, early SCSI ...).
3-USB sticks / memory cards 5-6/10 and also about memory cards, the problem of old formats (Memorystick, Smartmedia, CFI/II, ...)
4-3.5 floppy 4/10
5-CD, DVD, ... less than 3/10
The best system is punched tapes, even after 3/4 of a century, almost 100% are still readable but I never used it and who still needs it ?
I don't know yet about SSD but till now seem quite reliable.
About cloud storage, what if your supplier go bankrupt ?
The best option for important data is multiple copies, and ideally at least one on a offline storage.
This is of course for long term storage/reliability, for years.
4
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
3
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
a simple example , got lot of music on tape , but i no longer have a tape deck , i can still buy one but don t know for how long , 8track tape and vhs or beta are already no longer avalabe , flopy to is no longer avalable , am 47 and i have alredy see lot of tech disapair ,in my life time , and soon will be the cd or dvd , many new machines no longe have optical drive ,and some of my cd from 2003 are no longer readable ,, idi drive are no longer , how long do you give sata ,,, an other 5-10 years ,,
2
-
2
-
2
-
2
-
Not just an archaic word list. Most people have a personal lexicon of nonsensical words they use regularly. There's also the benefit of being multilingual, thus having even more words to use. By using words that can't appear in a hacker's dictionary, you force them to use a raw bruteforce attack.
This is why I don't even have a complexity requirement in the systems I develop, over a certain minimum number of characters. The longer your password, the more rules are lifted. When I did an audit on one of my test systems, I found one user who actually had a password with more than a thousand characters. He types it from memory, says it's nothing but words in PascalCase. He's trilingual and knows slang from two extra languages, so he's definitely safe.
That being said, in these systems, we're all nerds, it's not an end user product or an enterprise network or anything, just toys for nerds. Though I would like to see more end user products and enterprise systems adopt this paradigm.
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
If everybody starts using passwords consisting out of four capitalized words, hackers would take a word list containing the 2000 most common English words and try combinations of those with every word capitalized and separated by space or dash or nothing (CamelCase), as 99.9% of all people pick either of these. That's called a dictionary attack (as you are using a word dictionary). They would certainly not brute force that and start with aaaaaaa; actually nobody is doing that anymore for decades anyway (common attacks use lists of known passwords or Markov chains). And testing all combinations of 4 words from a list of 2000 is only 2000^4 combinations which are 16 * 10^12 which isn't a lot. Even if you need to try all of these once with space, once with dash and once CamelCase, this only raises that number by a factor of 3, so it's 48 * 10^12. Compared to that, 14 random characters A-Z, a-z or digits are about 10^25 possibilities, that's a way bigger number (10^15 is thousand times as big as 10^12 already and we have 10^25).
Here's what I do: Not remembering passwords at all, that's what password managers are good for. There are only 6 passwords I need to remember, one is for accessing my password manager and for those I remember a sentence and take the first letter of every word. Fictional example: Alpietriyjras - How could I remember that one? "A long password is easy to remember if you just remember a sentence". Also super fast to type: Say the sentence in your head and just always hit the first letter of every word. These passwords are easy to remember bu they withstand brute force, they withstand Markov chains, they are not found and password lists and unlike words, they also withstand dictionary attacks.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
On the one hand, yes, nothing lasts forever. On the other hand, as long as there exists the knowledge to retrieve the data, then it is TECHNICALLY retrievable. (I still have multiple working floppy drives, both 3-1/4 inch and 5-1/2 inch. No 8 inch, though.)
As for SATA, it's been out well over 20 years. It's not going away any time soon, but it won't last forever. (But then, you can still find IDE drives for sale, so...)
1
-
1
-
You do well, I don't think I've learned much from you, but I can use your videos to teach others.
I remember the dark days of IE5 and IE55 like it's some kind of PTSD. Honestly, Netscape wasn't awesome either. Old Opera was pretty darn good.
Firefox is where I settled and still am. I remember the time when it was still called Phoenix. I've always been a standards guy, didn't like Flash, Java applets, ActiveX, etc. either.
HTM5, VP9, AV1, etc. is where it's at. HTML5 really killed those plugins out the door. Some things I run as PWA (Progressive Web App) now,
I have a Firefox Phone for a while, that's how much I supported standards, original iPhone was supposed to be that way too. But maybe some things should be native in that time, so they went with that and then they eventually they figured out could make lots of money with the app store model. And mobile Safari became the IE5 of mobile.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
"Person. Woman. Man. Camera. TV." - Your video (which is awesome and informative, btw), makes me wonder about that time the former cheeto-in-chief went on a rant about his mental abilities by repeating those 5 random words.. What are the odds he was actually revealing to the entire world the secret words someone had set as his password? For any other human on the planet, the notion of them being so dumb as to say out loud the very thing they were told never to say out loud seems preposterous, no one is that stupid! Right? But for a nitwit with a reputation for doing exactly that, the idea seems far more plausible. Let's face it, Drump can't keep a secret to save his own arse. I'd bet money "Person-Woman-Man-Camera-TV" was supposed to be a secret passphrase he was supposed to keep under wraps. Whether it was the password to his Twitter account, or the nuclear launch verification phrase, is anyone's guess. I also question whether or not anyone would have felt it necessary to change the phrase after he broadcast it to the world, either because they doubt anyone would believe someone so stupid as to reveal their password in such a manner, or because they felt it pointless to give Loose-Lips-Donny a new secret phrase knowing it would only be a matter of days before he compromised that one as well.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1