018118055

joined 2 years ago
[–] 018118055@sopuli.xyz 1 points 2 years ago* (last edited 2 years ago)

I guess my comment was facetious. I don't mind if someone would try to implement it. Of course getting people to stay federated with such a place may be a challenge, but maybe some will want the money.

[–] 018118055@sopuli.xyz 2 points 2 years ago (3 children)

I really enjoy the discussion here. Refreshing! Most of the time I as a relative non-expert have no idea what I'm doing, but I do read things as much as I can. Otherwise I'm a fallen sysadmin who got a job managing cyber because bills need to be paid.

Open, closed, it's all object code in the end which can be examined in disassembly, or the behaviours observed during runtime. Open makes some processes easier in this area. I think the real strengths in this have been beyond security, to enhance cooperation and reuse so we don't waste time constantly reinventing.

[–] 018118055@sopuli.xyz 4 points 2 years ago (2 children)

We could have an instance solely dedicated to advertising and see who signs up.

[–] 018118055@sopuli.xyz 2 points 2 years ago (1 children)

At least there have been attempts to subvert open standards for cryptography through the standards process. And occasional suspicious pull requests in critical places - I assume those are done through cut-out proxies so we don't know who tried.

[–] 018118055@sopuli.xyz 2 points 2 years ago (5 children)

I think the more interesting question has long been: what's (or who is) your threat? Against a sufficiently motivated and resourced adversary, there are few real obstacles. Conversely, some people are just not interesting because there's little or nothing to gain from attacking them.

[–] 018118055@sopuli.xyz 2 points 2 years ago (10 children)

No hypothesis needed https://en.wikipedia.org/wiki/EternalBlue can't have been a one-off either.

[–] 018118055@sopuli.xyz 7 points 2 years ago (12 children)

Selection bias though. We don't know how many have not yet been caught.

[–] 018118055@sopuli.xyz 3 points 2 years ago

Enterprise software inventory can unfortunately be quite chaotic, and understanding the exposure to this kind of vulnerability can take weeks if not longer.

[–] 018118055@sopuli.xyz 34 points 2 years ago (17 children)

"given enough eyeballs, all bugs are shallow" ...but sometimes there is a profound lack of eyeballs.

[–] 018118055@sopuli.xyz 9 points 2 years ago* (last edited 2 years ago)

Copyright has evolved from a limited monopoly on a work of a handful of years, into an entitlement which has diverged sharply from the original intent of the law. It's time to bring the law back into balance with its intentions of promoting the creation of new works, while granting the public free access to those works after a reasonable time. Lifetime plus seventy years is not reasonable.

Edited to add - consider the number of great artists whose works never commercially benefited them. Not because of "piracy", but because their work was not known or recognized. Still, they made their great works because they were compelled to do so by their existence.

[–] 018118055@sopuli.xyz 3 points 2 years ago* (last edited 2 years ago)

I'd rather be lake Saimaa

view more: ‹ prev next ›