• 0 Posts
  • 16 Comments
Joined 1 year ago
cake
Cake day: July 9th, 2023

help-circle

  • Most consumers are familiar with the 802.11 standards; however, this new sequential number rebranding is intended to simplify things. Previously, the naming design used the alphabet, starting with a to bto g and n, with each one representing the next generation. We’d expect z to be the last or fastest one, or until they have new names, but suddenly we’re on 802.11ac, which is faster than all previous versions, so it’s understandable that users would be a bit confused. Thus, starting from 802.11n, Wi-Fi will be referred to as Wi-Fi 4, 802.11ac as Wi-Fi 5, and 802.11ax as Wi-Fi 6.

    —————

    WiFi 6: higher data rates, increased capacity, enhanced performance in dense environments, and improved power efficiency. Operating on the same 2.4 GHz and 5 GHz band as Wi-Fi 5, Wi-Fi 6 is rated to support transfer speeds of up to 10 Gb/s, which ranges from four to ten times faster than the current standard.

    —————

    802.11ax utilizes OFDMA (Orthogonal Frequency Division Multiple Access), one of the big advancements with LTE technology.

    TL;DR: less congestion in crowded networks and better speeds.











  • It’s not the legal name, it’s whatever you want it to be, or your name with a salt. There is no requirement for the “user” and “site” fields to be: your name or your webpages name, you just need to remember your pattern. Your User could be a complex password too . Your sites could have another complex password preceding them. Your website format could even be preceded by another generative password. eg getting my lemmy creds would look like: pwd sup3rs3cure%, user w0ntc4tchm3^ , website: Naqm3~KinoZiju.lemmy , not my actual email, or my display username here, nor the actual plain url of the website . Good luck getting any other website password if “sup3rs3cure%” is leaked, which is hardly possible as it is never uploaded anywhere .


  • cuchilloc@lemmy.worldtoPrivacy Guides@lemmy.oneKind of a Rant
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 year ago

    It says about spectre:

    With these 2 password managers, if I know your master password, all I need to do is to find your username/email address(which is trivia cuz usernames are public and email addresses are not confidential), and I can derive every single password you have and completely mess you up

    But you clearly must not use your email as your “user”, and you can also salt your “website” too, eg: I am James Wililiams, email: jimmyw@gmail.com, I want a password for lemmy.world, if your spectre usage is: user: jimmyw@gmail.com, masterpassword: mydogsname99, site: lemmy.world, your masterpassword leakage might be dangerous. But if you generate your passwords in the form of: user James MyMagicSalt Williams, password: ASuperCrazyMasterP455w0rdW1th1337, and website: anotherOfMySalts.lemmy.world, there is nothing wrong with someone getting your master password, good luck getting any real passwords from it. You would need to straight up be keylogged and be inputting the 3 settings while somebody knowing you are doing it in order to make sense of the keylog.