this post was submitted on 16 Sep 2025
63 points (95.7% liked)

Technology

75191 readers
2791 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] probable_possum@leminal.space 11 points 20 hours ago* (last edited 16 hours ago)

data in transit

Yes, but then it is stored unencrypted on github. Ready to be used as training data by github.com/ Microsoft or whoever. Which isn't bad per se for i. e. public repositories. Just pointing out, that the weakest link in your chain of security measures is the... weakest link.

If you wanted to secure your code, you could store it on-site, behind a firewall, in its own network segment, with encrypted offsite backups. Elliptic curve cypto would help too in this scenario. And MFA. And access restrictions. Many possible measures.