If the universe’s causal mechanisms were infinitely fast, the entire history of the universe would play out instantly in zero time, and we’d skip straight to the heat death of the universe.
The fact that time even exists is implied by / a result of causal actions having some finite propagation time.
Yep I specifically keep Google Maps around to find restaurants even though I far prefer the audible navigation from Apple Maps nowadays once I actually want to drive there.
Go Mac. The GUI is stable and boring: the Finder hasn’t changed much in years. It’s Unix underneath so you can use command-line stuff or dusty programs like Emacs.
You can now pick up a MacBook Air at Walmart for $700. Considering the inflation we’ve had, that’s actually reasonable. It will do the Unixy stuff well. My Mac is of this same class and I’m happy with it.
All: if you're going to post in this thread, please make sure you're up on the site guidelines at https://news.ycombinator.com/newsguidelines.html and that your comment is strictly within them.
That especially means two things here: being kind, and not using the thread to do battle. If you're not able to stick to that, that's fine, but in that case please don't post.
What does be kind mean in a context like this? Many things, but here's one in my view: it means finding a place in your heart for the humanity of the other—whoever the other happens to be for you.
That isn't easy but it's the spirit we want here. If you can't find it in yourself, that's understandable, but on this topic, please only post if you can.
1. You prove you have control of a key without telling the service the content of the key (like SSH keys, and any other PK setup) so: you cannot lose your password. The private part probably never leaves your device (probably - if you use Apple or Google's implementation there's magic/low security sync, you might also manually backup the private keys to a file)
2. A new keypair is generated per service. Don't reuse your password is baked in the spec, and by using individual keypairs the service can't profile you by the public key (privacy).
3. And possibly the most important. WebAuthn (of which Passkey is a popular marketing term) includes the asking identity during the registration/signup and login/proof stages, it doesn't rely on the user inspecting the url/webpage look/auth domain. Ie. You cannot be phished by examp1e.com when connecting to example.com (much like SSH's TOFU, but sorely missing from most web interactions).