• 0 Posts
  • 31 Comments
Joined 3 years ago
cake
Cake day: June 23rd, 2023

help-circle
  • PowerCrazy@lemmy.mltoProgrammer Humor@lemmy.mlZero Trust Architecture
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    29 days ago

    Ultimately your concerns stem from the philosophy of privacy, but you are weak on what practical privacy means. You have to give up a certain amount of privacy to participate in society at all. This is the case regardless of any technology. Once you decide you need a cell phone, you now have a tracking device on your person that can be used by anyone that wants to track you, specifically. You cannot prevent this regardless of what you do. Assuming you are not a person of interest for a nation-state, this exchange of privacy for convenience is rational.

    There are things you can do in-order to increase your privacy in any un-trusted network though. For example: MAC-address randomization. DNS Proxies, VPNs, Privacy focused Browsers block-lists no-script etc etc.

    Not all of these are relevant in all situations, and all of them can be made moot as soon as you login to some place. i.e. logging into a lemmy instance means that you now are uniquely identifiable and information can start being collected about you.

    Now the question of “trust.” i.e. you don’t “trust” your friends network? Why not? Any argument that you can make about not knowing their network applies 10-fold to the cell network that you have absolutely chosen to trust. So the measures that you take with your own device to protect it from the public phone network, are equally effective on any wireless network. And that is where privacy advocates start getting squirrely.

    tl;dr, if you have already taken the above steps, all untrusted networks should be treated the same according to your personal privacy envelope.


  • This is a great example of someone who has a lot of fear in their life that stems from ignorance, but tries to pass it off as something else. But make no mistake, you have a large gap in knowledge, and that knowledge gap combined with the paranoia of what you read from “privacy advocates” means your life is much harder and more insecure then you realize.







  • Idk, I guess I should ask why python needs a default function? If I’m running it as a script with commandline invocation I just copy and paste the if main namespace thing from stack overflow and it works as I intended. It also works if I invoke via python my_script.py $args, so I don’t really see why I should philosophically care about how other languages that I’m not using do it.







  • PowerCrazy@lemmy.mltoProgrammer Humor@lemmy.mlA quick intro to pointers
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    1
    ·
    1 year ago

    I “understood” on a basic level what pointers were when i was first learning programing as a 12-13year old. But I never understood HOW to use them, or manipulate them, or what functions you use to interact with them, or how to examine them, or how to declare them, etc etc. And since I was young I never got the opportunity to take an actual programming class that taught any of that throughout high school. By the time I got to college I went with Electrical Engineering instead of computer science and so my journey with pointers ended.

    Now I do python and never have to think about pointers.


  • This is fundamentally true. However it is possible to limit the bandwidth of data the employee can exfiltrate.

    Assuming a privileged employee suddenly becomes a bad actor. Private-keys/certs are compromised, any kind of shared password/login is compromised.

    In my case I have a legit access to my company’s web-certs as well as service account ssh-key’s, etc. If I were determined to undermine my company, I could absolutely get access to our HSM-stored software signing keys too. Or more accurately I’d be able to use that key to compile and sign an arbitrary binary at least once.

    But I couldn’t for example download our entire customer database, I could get a specific record, I could maybe social engineer access to all the records of a specific customer, but there is no way I’d be able to extract all of our customers via an analog loophole or any standard way. The data set is too big.

    I also wouldn’t be able to download our companies software source code in it’s entirety. Obviously I could intelligently pick a few key modules etc, but the whole thing would be impossible.

    And this is what you are trying to limit. If you trust your employees (some you have to), you can’t stop them from copying the keys to the kingdom, but you can limit the damage that they can do, and also ensure they can’t copy ALL the crown jewels.