And it's expected as you still had that device. And it's not the same key, a new key has been created for that new device. Now if that device cannot be accessed?
Tibert
Nothing of that?
You don't need to export or know what is the key.
The key is different for each device.
You won't need to?
The key is for a single device. Logging in on another one is going to generate another key.
They key is secured with the pin of the device, so when you try to log in, you can use the pin to log in, and not the password.
It can be cracked in less than a second?
If someone never loses their phones, laptop... Maybe it's secure.
But if someone steals it, how secure can it be? Is the key protected by the pin encryption? If so the encryption is now useless.
Here is a French video about Micode interviewing the French DGSE : https://youtu.be/g_jEz6aF2b4?si=-sUAIvDf4F7-7kGc
They crack the phone security in 4 seconds with the pin beeing : Mic0rp2022. The software used is hashcat, an open source tool.
Circular isn't a great idea, and here are most of the idea why it is not : https://electronics.stackexchange.com/questions/528821/why-dont-we-have-a-circular-usb-port
USB required to have a stable connexion, as it's a digital signal and not an analog as jack ports, which just sends curent through it. Rotating the connector could maybe introduce issues for signal integrity.
The usb connector has much more connectors than a jack port. It would take a very long hole to fit them all. (usb 3+, usb C...)
Size constraint. USB C is flat, a round port is not. So it's bigger in 1 way, but smaller in the other, and so creates more design challenges.
I disabled their notifications for recommended, and activity in posts I participated to. No need to get spam from there. And as I only post very little now (mostly answered my question myself...), I don't get much of anything as notifications.
Tho I don't uninstall the app as it still has some uses, tho I could use the Web version. But its not fast.
Yeah... It's not really the same.
Python is a programming language, much harder to use than power Querry as power Querry does the programming. There are actions you can do in power Querry, and it will automatically created and adapted to the previous and next step in the M language, tho the next steps aren't automatically changed if there is a breaking change.
Grafana not sure. I am working in accounting. Maybe I can talk to the person who set up power Bi, but not sure if it would be adapted. Currently the tool isn't deployed to clients, but mostly ready for testing.
Most of the time, the cache is limited in space. Unless you need the 1-1.5gB of space, it won't affect much.
For PowerPoint, I guess you would be able to find something which suits your needs, with libreoffice, onlyoffice... And others.
However for my work, there is currently, no alternatives I know to Excel, because of Power Querry. There is also power Bi beeing extremely powerful without alternatives.
For personal use, I don't need much of them so, whatever.
The guy who gets scammed by a fake women bot account.
The person who reads a lazy ai article.
It benefits a lot of people, but not the ones who have a direct use of the ai for themselves.
So first, no, all the files should not be accessible : There are special not "files", but keys, like the key used for this method. These keys pose a huge security risk of they are leaked somehow. The key can be something used to encrypt the device/disk, encrypt a connection, and other things associated with encryption.
And because of that security risk, they are often stored in a special chip or simulated chip (like the simulated tpm 2.0 on pc cpu), and not just "stored" so any malware or who knows what can access them just by reading the drive.
Second, the key is never transfered. When you connect to another device, that other device will get another key. Or maybe could it be backed up somehow in case of recovery on another phone? But that would defeat the entire purpose of this.
How Google can do to allow you to connect to another device if the first one is lost, not sure. But it would certainly either ask for a password and a 2fa method.