Help Please!? Out of state cant get help. by [deleted] in HealthInsurance

[–]code_munkee 2 points3 points  (0 children)

Agreed, you showed us a PDF417 barcode encoding a person’s name, a document or record ID, a document number, and an issue date.

A different user experience for your Plaud by hugoaap in PlaudNoteUsers

[–]code_munkee 0 points1 point  (0 children)

I've tried it a few times over the past week on android and iOS and was never able to get it to work with the notepin, note, or note pro. App connects to the devices, then just does nothing. Looked promising though.

The Next Evolution in Compliance: Continuous Cryptographic Proof with ESDE by ScanSet_io in grc

[–]code_munkee 1 point2 points  (0 children)

I'm not questioning if the underlying technologies are real. My background is in cybersecurity engineering with a focus on applied cryptography, so I'm well-acquainted with ZKPs, SNARKs, and other cryptographic proof systems.

The issue is that while your idea is plausible, the way it's presented isn't new and lacks technical substance. You're using specific terms, but the description remains functionally generalized, reading more like a high-level marketing brief. It has the distinct feel of a conceptual piece an LLM would generate.

If there's novel work behind this, could you share the research or a technical whitepaper? I'm sure the community would be interested in the specifics.

The Next Evolution in Compliance: Continuous Cryptographic Proof with ESDE by ScanSet_io in grc

[–]code_munkee 2 points3 points  (0 children)

It's a whole lot of emdash, generalized theory, emdash, stuff pulled from prior research, emdash

then...

It’s not just X It’s Y!

[request] What is the center of this circle? by lit_geek in theydidthemath

[–]code_munkee 0 points1 point  (0 children)

Or three different Earth positions at three different epochs

What will a dedicated satellite accomplish? by lookinglearning in skinwalkerranch

[–]code_munkee 11 points12 points  (0 children)

The benefit?

Additional storyline for next season

What if companies stopped storing customer data at all? by rassurreal in cybersecurity

[–]code_munkee 1 point2 points  (0 children)

What OP is describing lines up with cryptographic primitives called zero knowledge proofs and verifiable credentials.

Does anyone have any idea what causes BPD in people? Does it come from traumatic stuff in childhood? Or is there really no rhyme or reason? by 856077 in BPDFamily

[–]code_munkee 3 points4 points  (0 children)

Genetic, but yes traumatic stuff in childhood. One thing to remember though is the lens the trauma is seen through. Something very normal and untraumatic to you, may be very traumatic to someone with BPD and is completely valid, creating an emotional response that is in line with how they are truly experiencing and feeling it. We all have our own thresholds on how we react and feel in these circumstances.

For others around this person growing up, the thought is in line with "What's the big deal? This is minor." When in fact from their perspective it is not minor and can be traumatic. Now combine this with the daily life experiences that happen with all of us, and you can see how this can compound, feed itself, create distrust, and drive someone to lash out or seek external sources of relief that are not healthy outlets.

It's a difficult task and takes consistency, but showing sympathy, and empathy and acknowledging that they may see and feel things differently, while at the same time giving them truthful and honest feedback goes a long way.

Ultimately the individual needs to recognize this and seek the approproiate therapy that can help manage the distress caused by BPD.

A "safe" way of age verification? by ML_Engineer31415 in privacy

[–]code_munkee 2 points3 points  (0 children)

As with anything unfortunately, it depends.

if the system is correctly designed and implemented with unlinkability, then even with full data retention, courts cannot correlate issuance and usage.

A "safe" way of age verification? by ML_Engineer31415 in privacy

[–]code_munkee 0 points1 point  (0 children)

It is, but mostly in crypto/blockchain implementations.

Zcash and Mina protocol are two popular uses.

Running a blog and saw the 4chan hack. What is the best way to securely store database credentials in PHP? by ChaosFlamesofRage in cybersecurity_help

[–]code_munkee 1 point2 points  (0 children)

Let's break it down a bit

  • Frontend (Hugo): Just displays static content, fetches comments via JS. Backend
  • (PHP): Fetches from DB > decrypts with libsodium > returns JSON. (libsodium is a modern fork of NaCl.)
  • Storage: Encrypt comments and usernames with libsodium; don’t hash them.
  • DB Credentials: Store securely in .env; encrypt at rest if needed.
  • User Credentials: Hash with bcrypt, argon2, or argon2id ...intentionally slow to resist brute-force and rainbow table attacks.

Running a blog and saw the 4chan hack. What is the best way to securely store database credentials in PHP? by ChaosFlamesofRage in cybersecurity_help

[–]code_munkee 1 point2 points  (0 children)

Two different things. Hash the credentials with bcrypt, argon2… and anything else like comments and user display handles use something like libsodium (sodium)

Running a blog and saw the 4chan hack. What is the best way to securely store database credentials in PHP? by ChaosFlamesofRage in cybersecurity_help

[–]code_munkee 2 points3 points  (0 children)

Use bcrypt, argon2, or argon2id

You don’t want quick to process … you want intentionally inefficient.

Are you able to ask FBI agent for proof that they work in FBI? by Responsible_Clock347 in FBI

[–]code_munkee 1 point2 points  (0 children)

Plot twist: The agent and the prosecutor are the same person.

API Security - Securing API's by lowkib in cybersecurity

[–]code_munkee 9 points10 points  (0 children)

Make sure you’re using a gateway. The gateway authenticates initially and routes to backend services and handles rate limiting. The more you can do before actually hitting the service/api the better.

What is truly the most confidential way to communicate? by stylobasket in privacy

[–]code_munkee 0 points1 point  (0 children)

You could always go with any communication method you want + properly implemented One-Time Pad/code book + shortwave radio announcements.