• 3 Posts
  • 81 Comments
Joined 1 year ago
cake
Cake day: June 17th, 2023

help-circle






  • Don’t remember the tool, maybe someone here does, but there’s some web service out there that boasts a “no storage” approach. You provide some URI and some other value (maybe username) and it makes a password for you, but it’s always the same for a given combination. Basically it’s a purely functional generator.

    Downside would be forgetting a minor detail (Did it end with a slash or not? What was the username?) or the site going down. You can achieve the same thing yourself with a hash calculator but those passwords are a bitch to type in.

    tl;dr just use KeePass







  • I think this is a fair question. I haven’t seen anyone mention the benefits of using a non-web mail client (OP mentioned Yubikey but 2FA isn’t uncommon with web mail). I would actually consider using one if it gave me clean up options (e.g. haven’t opened an email in 3 days and the sender is not in my address book move to Junk/Spam). Main reason I rarely look at email is that it’s 90% stuff I have no desire to read and marking things as spam is a never ending cycle.







  • This is the kind of AI stuff that really annoys me. Looking at one of the mutation examples I didn’t see anything that wouldn’t normally be tested by a typical mutation tool. You took a simple, idempotent process and you got an llm to do it slower, less accurately, and using more resources.

    If you wanted to marry the two in a new and possibly useful fashion I would say use an llm to analyze the results of a standard mutation test and give guidance on what issues should be acted upon first. An off-by-one calculation could mean somebody loses a million dollars or it could mean a button is grayed out. Standard mutation tools don’t give you that context.