@coolboymew@feld@ElDeadKennedy@Moon@adiz I don't know anything about these passmarks or whatever, but my X1 works great. Video conference, CAD, Firefox, e-mail, office: all in the same time. I've got Fedora 38 on it currently. I also have a corporate T14, which I use as a VM host and a VPN node. Both of them have hardware touchpad buttons, which is a killer feature in the world of monolithic touchpads. I used to hate the nipple and the offset Ctrl of Thinkpads, but I learned to deal with that, simply because Thinkpads are going to shit slower than anything else.
Also, reminded me about this tremendous presentation (I recommend watching it all, although it takes 45 minutes for all 3 parts): https://www.youtube.com/watch?v=84WI-jSgNMQ
@guizzy@Moon@coolboymew You can also found startups without any credentials. I own and run a company that makes guns. I'm not a gunsmith with an SDI diploma, and not even a mechanical engineer. And nobody gives a flip, they just pay me money for the product.
@Moon@vriska My "password manager" remembers 788 password entities, although not all of them are for websites. Some are for LUKS, some are for routers, etc. The first password it remembers is for "Java development", and the 2nd is for Avogato. It only had 8 characters! I put the manager in quotes because there's no manager. I just store passwords in files and encrypt them with PGP. This excludes my mobile devices, but fortunately I do not lead a mobile life. On the upside, large-scale intrusions at password managers do not affect me.
@Moon@vriska One of the first systems that I worked on had 3-letter passwords. I was an undergrad back then, mind. So, after some snooping around I found that it kept them in a 16-bit word. That immediately made me think about Radix-50 encoding, and after some quick cryptoanalysis in Fortran IV, I found that the encryption was a rotation left by 5 bits. The master password was "WOW". Using this information, I went around universities in the city, penetrating student terminal rooms, and getting privileged access. For one of them, I forged a student ID by using a pencil and a piece of paper that I attached to my own ID with small chunks of bread in leu of removable adhesive. When the developers heard about this, they updated the system to keep 8-character passwords in a separate file, accessible with a special syscall, and modified all utilities of course.