• 4 Posts
  • 88 Comments
Joined 2 years ago
cake
Cake day: June 17th, 2023

help-circle






  • This was downvoted, but is a good question.

    If your account is compromised, the shell init code could be modified to install a keylogger to discover the root password. That’s correct.

    Still, that capture doesn’t happen instantly. On a personal server, it could be months until the owner logs in next. On a corporate machines, there may be daily scans for signs of intrusion, malware, etc. Either way, the attacker has been slowed down and there is a chance they won’t succeed in a timeframe that’s useful to them.

    It’s perhaps like a locking a bike: with right tool and enough time, a thief can steal the bike. Sometimes slowing them down sufficiently is enough to win.












  • It uses layers, the same way a phone keyboard has a separate layer for numbers and symbols. Holding down one of the three thumb keys on either side activates a new layer. Since you can use your thumb and fingers at the same time, there’s no lose in typing speed. Indeed, the layout puts numbers and symbols closer to the home row on a layer than using a physical number number.

    For all symbols, you would have needed a shift-modifier to access those before. With this design, the symbols are closer but use a layer switch key instead of a shift key to access them.

    Everyone who uses a phone keyboard has learned a new compact keyboard layout. It’s not so hard.