Ō̴̡̨͍͕̠̹̘͖͓̭̝̰̖͉̬̫͍̝̰̟͖͖̞͇̟̻̫͇̠̯̋̋̂ͅͅA̷̡̧͎̫̬͖̠͍̼̗̠͊̉̏̓̈́̂̀̈́͆͘͜uth @oktadev oauth.wtf oauth.net 🎥 livestreaming youtube.com/aaronpk aaronpk.tv 💛 #indieweb 🐘🦋

Portland, Oregon
Joined April 2008
Filter
Exclude
Time range
-
Near
Replying to @pdxleif
We're in an apartment so there's some building wide filtering for the hallway. Keeping all outside doors/windows closed, and running an AC. No special filters tho.
1
Replying to @rdegges @vibronet
Just a floor air conditioner
Replying to @vibronet
315 outside 178 inside here 😖
2
1
Replying to @jpterry
My secret was I bought it last year and hadn't actually set it up yet haha
3
Fun Friday night project: set up a PM2.5 sensor inside and hooked it up to my home automation hub, and now have a display on the wall showing the terrible terrible inside and outside AQI
4
2
26
It's an iPad with Magic Mirror running in kiosk mode magicmirror.builders
2
Replying to @every_daydad
Why isn't it running Windows? 🧐 I'd actually consider trying it out in that case
1
1
Replying to @Fox0x01
This is great stuff! Your slides are gorgeous!
4
Replying to @saradietschy
Awake from 8am - 12pm sounds like the schedule my cat keeps
2
while they're wearing noise canceling headphones
1
3
Replying to @dreeves @ATT
of all the problems in the world that currently need solving...
1
Replying to @dreeves @ATT
wait this is a real thing? a real person sat down and said how can we innovate bills?
1
Replying to @dreeves @ATT
but what does it even mean
1
I just might do that haha. The shirt i'm wearing today says "I find your lack of security disturbing"
2
tbh it's like the "security" involved in writing checks, it's best if you don't think too much about it
1
1
The browser doesn't have access to the MAC. Google *could* (and probably is) checking the IP address, but it's all heuristics because your IP address may change at any time, e.g. cell phones have very unstable IPs, hop in a plane and land with an IP from another country, etc.
💯 There aren't really any other tools browsers can use for this right now. The process of logging in looks like basically: you type your password in google, google gives you back a cookie, your browser makes a request with that cookie and the server knows who it's for.
1
Interestingly that doesn't even matter for this since it wasn't the "normal" phishing style attack. Don't open files you download is the only safe thing, or open them on a machine that isn't logged in to anything. That obvs isn't practical, so it's a lot harder in practice.
1
No, the cookies are how the browser is logged in to google. No passwords needed, 2fa doesn't matter. I'm thinking I might need to make a video on this.
2
2
It was a windows executable disguised as a .scr file, no keylogger needed for this, it was able to pick up the browser cookies from the hard drive. It could have happened on Mac just as easily.
1
1