• 1 Post
  • 83 Comments
Joined 1 year ago
cake
Cake day: June 29th, 2023

help-circle






  • I wouldn’t trust an LLM to produce any kind of programming answer. If you’re skilled enough to know it’s wrong, then you should do it yourself, if you’re not, then you shouldn’t be using it.

    I’ve seen plenty of examples of specific, clear, simple prompts that an LLM absolutely butchered by using libraries, functions, classes, and APIs that don’t exist. Likewise with code analysis where it invented bugs that literally did not exist in the actual code.

    LLMs don’t have a holistic understanding of anything—they’re your non-programming, but over-confident, friend that’s trying to convey the results of a Google search on low-level memory management in C++.




  • Elysium is definitely the slowest, but time saved carries over, so if you’re fast on Tartarus, you’ll have more time in Asphodel, which is relatively short in terms of number of rooms, and subsequently more time in Elysium.

    And as someone else mentioned, it saves time to be aggressive too, so never be idle and try to anticipate where enemies spawn. Enemies without shield (or when the shield is gone) can be stun-locked, so just hammer away at them.

    Maybe I’m forgetting how much time and practice I’ve put into going faster, but if I can do it — everyone can, that’s for certain.

    Drawing inspiration from speedrun builds is great, so maybe check some of those (linked earlier) out. There are builds for different play styles, so I’m sure you’ll find something that works for you. :)


  • I’m not too good at high-heat runs, but I usually enable Tight Deadline level 1 and 2 first, and Extreme Measures 1 and 2, which is already 6 heat without much of a difference in difficulty. Extreme Measures 3 is a bit wild, IMO, but I guess it’s just a matter of practice, and then that’s 9 heat. Middle Management isn’t too bad either, and that’s 2 extra heat.

    Other than that, I usually go for Malphon (fists/gloves) with Aspect of Demeter and a build with Ares’ Doom effects on attack and cast, Athene’s dash and special, which usually gives me access to their duo boon: Merciful End which triggers the doom effects when I dash into an opponent of use my special. It’s insanely powerful.

    The Hades community on speedrun.com has some good guides and forum posts on builds — and videos of speedruns obviously, there’s a lot to pick up from them as well: https://www.speedrun.com/hades








  • Using a password manager I’d have to copy-paste or remember each password. Not all have a web interface.

    Then pick one that has a web interface or a CLI, Bitwarden has both and is free. KeePass databases can be hosted on your NAS and accessed to CLI tools. There are plenty of options. Or use passphrases (which are just as good as—or better than—complex passwords) and just type them? I use Bitwarden for literally each and every password/lock code/PIN that I have, and I have plenty of Pis and other things that don’t let me easily log into Bitwarden, but finding “Excentric4-Waxing-Adopted-Giraffe” on one device, and typing it in another really isn’t much of a hassle. (Also, why not just SSH into your Pis? Then you only need to worry about accessing a password manager on the machine you’re opening the SSH connection from.)

    From the comments on this post it seems that you’re mostly looking for validation of the idea you originally had rather than actual feedback on how secure that idea is. You’re obviously free to manage your passwords exactly as you want, but this idea of a “base password” is objectively less secure than the alternative put forward by many people in these comments, namely to use the Yubikey to log into a good password manager that then handles all the different (completely unique) passwords.

    There are always instances where doing things the best and most secure way is more cumbersome, and it’s up to you to decide if you want all of your passwords to be poor (and difficult to change, in this case) just because you occasionally need to log into something that doesn’t neatly integrate with a password manager.


  • Why not use the Yubikey for the master password on a KeePass DB (or another password manager) and then use actual different passwords—not just prefixed ones—saved in said password manager for your logins?

    It doesn’t matter if your base password is a 255 character high-entropy annoying-to-type-manually-on-a-phone-keyboard or a 16 character string of alphanumeric characters if you reuse it in a slightly predictable manner. For it to be somewhat secure, the prefix would have to be completely random, which kinda defeats the idea of you being able to remember them. A “base password” is, to be frank, only one small step up from using the same password everywhere.

    And as someone else pointed out, it makes it very difficult to change passwords, which also should be a huge red flag.

    Take a look at the leaks on Have I Been Pwned and see how many of them include either clear text passwords or extremely weakly hashed (perhaps even unsalted) passwords. If you show up in just one or two of those, then you’re in a significantly worse position than you would be had you just used different passwords.