Show more

I do like the idea of having a phone that can just make calls and text, but also tether a laptop. I would definitely use that feature during my commute.

Show thread

I could see myself buying one of these "dumb" phones this year. I want to set a better example for my kids and not be on my phone all the time. My existing iPhone7 could be used as an iPod Touch while on wifi, which I'm sure I'd use just as much at home, or I could get an iPad which I feel is more explicit in its usage to act as a deterrent.

- thelightphone.com/
- mudita.com/products/pure/
- puri.sm/products/librem-5/

Each has their pros & cons unfortunately with no clear winner.

This is a very thorough analysis of the security principles and usability of various Two Factor Authentication systems: wiki.shibboleth.net/confluence

The visuals in Avatar are still really good even after all these years since its release.

I think I would be sold on getting a @purism if it were to include USB-C. Love the form factor and styling.

I like the collection of technical leadership and management books I’ve been collecting. I’ve been donating old or outdated books to my local library, borrowing when I can and purchasing the ones not available. 📚📖

Saw “The Rise of Skywalker” last night. 👍👍

Really enjoying the “On The Metal” podcast by Oxide Computer. Brings back lots of good memories messing around and breaking computers back in the 90’s.

podcasts.apple.com/us/podcast/

I also have a green “killer bees” deck that I like playing with. I was there was a good online way to play with custom decks on a Mac.

Show thread

Found a white “Magic: The Gathering” deck I copied onto a printed Excel sheet but never had all the cards. Bought the remaining cards from cardkingdom.com to finally complete it after 15+ years. No idea when I’ll actually play with it.

Replaced this mess of old HDMI and component cables with 10m of HDMI 2.1 8K ready thin cable.....for my NES classic. 🎮👾

Wow, some very interesting new research here: tpm.fail/

Researchers published attacks that can recover encryption keys from Trusted Computing Modules (TPMs) (which isn't supposed to be possible) by timing elliptic curve signature generation. "On Intel fTPM, our key recovery succeeds after about1,300 observations and in less than two minutes."

Nearly all Windows computers store BitLocker encryption keys in TPMs.

Found myself re-implementing the same CDN setup over and over again for every serverless project I worked on, so I created github.com/smoketurner/serverl as a GitHub template repo for people to start from

We are living in an age where everything from clothing to furniture to technology is cheap and disposable. The assumption is that nothing lasts, so one might as well buy the cheapest thing and throw it away when it inevitably breaks. Nowhere is this more true than the phone market, but it's something we want to change with the Librem 5.

puri.sm/posts/librem-5-longevi

Dropwizard 2.0.0 has been released!
Thanks to the countless contributors who helped bringing this version out of the door!
Release Notes: github.com/dropwizard/dropwiza
Upgrade Notes: dropwizard.io/en/stable/manual

We are delighted to share that early yesterday we shipped the first #Librem5 Birch devices to backers puri.sm/posts/librem-5-birch-s

Stop 👏 Using 👏 Facebook

So many reasons, why you should consider closing your #Facebook account. Here is a nice documented list:

stopusingfacebook.co

Funny to see a ton of Chevy ads before seeing “Ford vs. Ferrari”

Show more
plock.social

plock.net part deux