For package managers like pip, is it a better practice to install packages with the `–user` flag?

I understand that for most package managers (pip, brew, TeX tlmgr, etc) packages are typically not audited, so there are some inherent security risks in using these package managers. Sometimes the package repositories aren’t trustworthy ei… Continue reading For package managers like pip, is it a better practice to install packages with the `–user` flag?

Doesn’t installing a TOTP client on your primary PC undermine the whole point of 2FA? [duplicate]

Authy is a popular cross-platform TOTP application that supports syncing keys across devices. I have been a little confused by the idea of having a desktop client… This way if someone accesses my primary PC they’d find all my passwords s… Continue reading Doesn’t installing a TOTP client on your primary PC undermine the whole point of 2FA? [duplicate]

How can third-party VPN applications tunnel all traffic of all processes on sandboxed operating systems?

How can (third-party) VPN applications tunnel all communication of all processes on sandboxed operating systems (such as OSX, etc)? Can they access the traffic of other apps and redirect them?

Why is this approach often pref… Continue reading How can third-party VPN applications tunnel all traffic of all processes on sandboxed operating systems?