I feel like people are overlooking the fact that this is typical early internet behavior lol.
I get that its the linux kernel mailing list, but I’m pretty sure Linus was way more wild online than in person because that’s how public internet forums and IRC used to be like.
Stallman has also said some equally braindead stuff lol.
It has 3 pins, and I found that it’s a linear (B), 10k ohm (130, as you said), potentiometer. I found similar ones, but the 9 and 5 at the top concern me. The others that I found have a 60 and a 6 there instead.
Potentiometers are pretty basic things. About the only thing I can think of that would be specified electrically is value (10k), wattage rating (but I doubt much current is sent through these in this application), linear/logarithmic taper, tolerance (often 5%, or 10%) and maybe the type of contact/track or something (probably doesn’t matter).
Those numbers could be manufactured date or lot codes or similar.
How does the thumb “wheel” attach? Or is it built in? I can’t tell from the single pic.
Other things to consider are the pin spacing and physical dimensions.
Found that the resistance of this potentiometer doesn’t change when it’s moved
Are sure you’re measuring across the correct terminals? The resistance between the two terminals of the resistive portion is constant. I would expect the resistance of a failed pot to either be zero or infinite
There’s a test pad on the PCB labeled “LT” (left trigger). I used that and compared it’s resistance to ground to that of the right trigger’s test pad. I got about 6-10k ohms on the working one (right trigger), and 3.9-4.4 on this one.
If you get Bitwarden pro (really cheap), you can save an OTP link together with the site credentials, it’s really good for keeping everything in one place
This isn’t really a good idea because then you’re putting all your eggs in one basket. The whole point of 2FA is that the second factor is in a separate location so if your first factor (password) gets compromised the second one (OTP code) still protects your account. If both factors are in one place you’re back to a single point of failure instead of 2, losing a key benefit of 2FA.
If you’re gonna do this, at the very least have 2FA with a security key on your bitwarden vault.
You lose security, sure. But you are gaining so much more ease of use. Bitwarden autofills your credentials and puts your token into your clipboard. Also it syncs your tokens to all devices. Effectifly this makes a site as easy to login as a site without 2fa.
The alternative is on desktop always get your smartphone, open some app type a token or on the phone to switch to multiple apps to get your credentials. Not fun imho.
I currently activated 2fa on over 60 sites, I doubt I would use it as much without BW.
For me, the key benefit of 2Fa is getting more security against leaked, stolen, phished passwords, and that still holds up.
The alternative is on desktop always get your smartphone, open some app type a token or on the phone to switch to multiple apps to get your credentials. Not fun imho.
There are desktop apps for OTP, you don’t need a phone. And since you only need to setup an OTP secret once, doing it for your phone and pc isn’t that big of a deal.
I have my OTP secrets in 3 places, 2 yubikeys and my phone’s authenticator app, with the former meant for my PC.
For me, the key benefit of 2Fa is getting more security against leaked, stolen, phished passwords, and that still holds up.
If your vault doesn’t have 2FA too this doesn’t hold up though. Means you’re trusting a single service that can get hacked with all your secrets. Sure, your other accounts are more protected against leaks and stuff, but if your password vault isn’t, you didn’t really change much, just pointed the hackers to one single place.
Yes I know hacking a password vault isn’t some walk in the park and rarely happens, but the point is any leaks from it would be 10 times more catastrophic for you if all your OTP secrets are also stored in it. I’ll spare myself from that nightmare with the small inconvenience that is a separate, offline OTP app.
Bitwarden uses end to end encryption. This severely reduces the risk their infra is attacked. The encryption keys exist on your devices only so it’s impossible to read the server side data.
The only real question is how much you trust Bitwarden as a company. Are they completely lying about E2EE to customers and auditors? If not, then Bitwarden is a good choice.
I self host Bitwarden (Vaultwarden) so I just use the built-in TOTP authenticator in the Bitwarden app. It’s nice to have it all in one place + having auto copy and paste when I log in. And because I self host, it’s all backed up securely and with (as far as I know) no real backdoors.
ETA: just realized what community this is in. people that replied to me I’m sorry lmao, I’m not a nut about this kinda stuff and I’m by no means recommending this just like using it this way for convenience factor and to keep the likes of google out of my password.
Fair, although I’ve said in a comment on this account somewhere else, I self host more for convenience sake than anything. I just like having my own password manager, sure it’s not as secure to use it for MFA but it’s better than giving my passwords to Google, LastPass, etc. and then using eg Google Authenticator. Self hosting is more a corporate distrust thing than a privacy thing for me
No, please do not do this. Two factor authentication should be just that: two separate factors of authenticating yourself. Having them combined in one is the same as one factor.
Said in the reply to the other comment here, but I don’t really self host for security/privacy sake. And in addition to that comment I’d also like to say that I do use a YubiKey when possible for MFA. I’m not a security nut enough to care about TOTP (which kinda sucks anyway) all too much but for important things I do use physical MFA.
I do the same thing. And Bitwarden’s 2FA is off my phone. In a complicated world, it’s reasonable to keep 1 password + 2FA as secure as possible. I simply can’t handle the hassle of pulling out my phone for every 2FA login, but still value the protection 2FA + randomly generated passwords provide.
Been using it for a while as the 2FA app used and recommended by Leo Laporte. I’ve had a good experience with it, but if it has any issues, I would love to know.
lemmy.one
Hot