Hacker Newsnew | past | comments | ask | show | jobs | submit | jasdine817's commentslogin

WiFi credentials maybe but I can't imagine the devices hold Netflix user passwords, I've never encountered it but surely the Netflix API just negotiates an API key tied to the user?


In this case, Barclays are the banking providers of several crypto companies including Coinbase in the UK.


I just used a tool called BIP39 generator on and offline machine which you can feed entropy and it will generate a bitcoin private key. then sent funds to that address.

Then just keep those details safe.


I wouldn't do that, the tool RNG could be backdoored. Did you read the source and compile it?


How do you handle giving access to your keys to your next of kin?


And how do you prevent access for your next of kin if there is a breakup/fallout?


Important question - I hope OP can answer.

Too many people I know haven’t instructed their dependents how to access their crypto.


Just let them know where those details are and how to access them if they need to.


you can use multi sig wallets. Which are synonymous to Shamir’s Secret Sharing Algo; tldr you can generate say 5 keys and you need 3 of the 5 to unlock.

As for if you die … you could use one of those services that will send an email out to your significant others if you don’t log in for X amount of time.


> As for if you die … you could use one of those services that will send an email out to your significant others if you don’t log in for X amount of time.

And put your bitcoin private key in there? Surely whoever runs those services would take all your money.


If you use multiple services each with a piece of Shamir’s secret you are more protected. You can get more sophisticated with this if you want e.g each piece can be xored or encrypted with a value only that person would know e.g their birthday or their fav food.

Being your own secure bank isn’t a trivial task. Hopefully this can get easier in the future


Full disk encryption for one thing.


> Full disk encryption for one thing.

Full disk backdoor. TPM has a long history of backdoorig.


Loads of third party apps have shell extensions that use control panel and there's 20 years of settings to migrate over. It's getting there.


I manage a password manager for an MSP that supports hundreds of Azure tenancies with dozens of engineers. 2FA codes in the password manager in a shared space is far safer than a non synchronised account with no 2FA. Since the TOTP code is not accessible too, it also means that password manager breaches are time limited.

Just depends on your use case.


You know that new car smell? That's the smell of all the glues they use.


Hotmail hasn't existed for at least a decade.


Because different people have different requirements.


Surely you can just set the timer most washing machines to start it a few hours after you leave? Personally though having washing machines running in an empty house makes me nervous.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: