• 0 Posts
  • 8 Comments
Joined 3 years ago
cake
Cake day: June 14th, 2023

help-circle


  • I think it has some valid use as a tool in programming, though relying entirely on it (“vibe coding”) just produces a mountain of difficult to maintain crap.

    What works for me is using it as tool like one could delegate to a junior programmer. I can write the signature of a method that it will complete the contents of; for example I’ll write “function reverseTextInSentence(string: text) {}” and tell an AI to implement that method. It saves me a little time and I can keep thinking about the larger picture rather than the details of reversing a string of text.

    That said: do not let it organize the structure of your project, don’t let it name things for you, don’t use in place of critical thinking, don’t ever think it can actually use logic and reason besides repeating things it found on online forums, and don’t let it write projects wholesale. It’s a tool that can be useful, and you need to know when to use it and when its use will just make things worse.

    Also fuck the AI corporations, run a free model on your own hardware.




  • BozeKnoflook@lemmy.worldtoSelfhosted@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    2 months ago

    There has to be, the PasswordStore app for Android can keep the GPG files in a storage location where other apps can read & write them. All you need is something to handle the synchronization.

    I’m a control freak and prefer to do things like that manually, so I just use the built-in git & SSH based method it provides.


  • BozeKnoflook@lemmy.worldtoSelfhosted@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    2 months ago

    That entry names are stored in plain text doesn’t bother me; if somebody has broken into my system so well that they’ve copied my password store then the last of my concerns will be if they can easily find out if I have a password stored for example.org or example.net. At that point it doesn’t matter if they can tell that I have a Jellyfin password stored, because that service is running on my server with clients installed on my phone & tablet.

    And I handle key storage with a pair of Yubikeys which hold a copy of my private key. It can’t be extracted (only overwritten). There is a physical copy kept on offline, disconnected storage, which could be an attack vector – but if we’re at the point of somebody breaking into my house to target my password management then all bets are off: you don’t need to break my kneecaps with a hammer for me to tell you everything, I prefer to keep my knees undamaged.

    For attachments I just add another entry; /services/example.org-otherThing - there’s nothing stopping you from encrypting binary data like an image.

    And when it comes to convenience: I have a set of bash scripts that use Wofi to popup a list of options and automatically fill in data. Open example.org click the login field, hit meta-l, type example.org, hit enter and wait a moment: it’ll copy and paste the username, hit tab for me, then copy/paste the password, then copy a bunch of random data into the clipboard buffer like 10 times before copying an empty string another hundred times to flush said buffer. meta-f for username only, meta-g for password only; it’s honestly way more convenient for me than the 1Password setup I use at work.

    I understand the point the video is making, but I think it’s irrelevant if you keep the private key on something like a Yubikey.