• 0 Posts
  • 314 Comments
Joined 11 months ago
cake
Cake day: February 15th, 2025

help-circle

  • It does sound like one, but it isn’t. Ignoring the differences in UX:

    Passkey

    • Per-service key pair, unique per domain, Identity bound only to that specific account on that site
    • Challengeresponse via WebAuthn
    • Trust anchored only in the target service (no external CA)
    • Private key sealed in OS / secure hardware keystore

    Certificate login

    • Single global identity usable across many services
    • TLS client authentication with certificates
    • Trust established via certificate authorities and chain validation
    • Private key stored in exportable file or smartcard

















  • If you have one of those cars that can be used as a boat. And you only ever use it in water and never on land, it doesn’t really make sense to me to exclusively call it a car. Even though it factually is one, it acts as a boat. At least call it carboat.

    If I have a VPN, but it’s sole purpose is to take all the traffic that knocks on it’s network-adapter and shove it down a dev/tun and vice verca, why can we not say (with the goal of clear communication and precise descriptions) that it effectively acts as a proxy ?


  • Hell the ability to access the internet via the tunnel, called Split Tunneling, is also controllable.

    It’s that ability to control where the tunnel terminates that allows consumer VPNs, like Proton, to be used the way they are.

    you can do the same split tunneling via proxy servers

    while private individuals absolutely do use VPNs as an ersatz replacement for Proxy Servers they are nowhere near the whole use case for VPN

    I agree. That also means that for certain usecases they are equivalent. It’s sometimes worth checking all options to find the best one for that specific case.