[-] kristoff@infosec.pub 3 points 1 month ago* (last edited 1 month ago)

A URL 'Free up to some-end-date'. ???

Phishing link? 🤔

[-] kristoff@infosec.pub 4 points 2 months ago

Big international companies have no problem to create pseudo "national" versions of services if they can make more money with it.

So there should not be a problem for the social media companies to create versions that meets local legislation.

If you create a product and want to sell it in a certain market, you must also adhere to the laws of that country/region.

[-] kristoff@infosec.pub 4 points 2 months ago* (last edited 2 months ago)

Protection of citizens against unjust ruling by a court is a protection-principle of democrary.

Why would you grant such a protection to an organisation aimed at destroying democracy (X/twitter)?

[-] kristoff@infosec.pub 4 points 2 months ago

As a sidenote. This reminds me of a discussion I haver every so often on "tools that make things to easy".

There is something I call "the arduino effect:. People who write code for things, based on example-code they find left and right, and all kind of libraries they mix together. It all works .. for as long as it works. The problem is what happens if things do not work.

I once helped out somebody who had an issue with a simple project: he: "I don't understand it. I have this sensor, and this library.. and it works. Then I have this 433 MHz radio-module with that library and that also works. But when I use them together. It doesn't work"| me: what have you tried? he: well, looked at the libraries. They all are all. Reinstalled all the software. It's that neither me: could it be that these two boards use the same hardware interrupt or the same timer he: the what ???

I see simular issues with other platforms. GNU Radio is a another nice example. People mix blocks without knowing what exactly they do.

As said, this is all very nice, as long as it works

I wonder if programming-code generated by LLMs will not result in the same kind of problems. people who do not have the background knowledge needed to troubleshoot issues once problems become more complex.

(Just a thought / question .. not an assumpion)

[-] kristoff@infosec.pub 3 points 2 months ago

To be honest, I have no personal experience with LLM (kind of boring, if you ask me). I know do have two collegues at work who tried them. One -who has very basic coding skills (dixit himself) - is very happy. The other -who has much more coding experience- says that his test show they are only good at very basic problems. Once things become more complex, they fail very quickly.

I just fear that, the result could be that -if LLMs can be used to provide same code of any project- open-source project will spend even less time writing documentation ("the boring work")

[-] kristoff@infosec.pub 4 points 2 months ago

OK. That makes a lot more sense.

Thank you for correcting the original post. 👍

[-] kristoff@infosec.pub 3 points 2 months ago

Concerning linux, yesterday I was watching this video on computerphile on the crowdstrike incident. https://www.youtube.com/watch?v=rlaNMJeA1EA (*)

What is interesting is the comment made in the video on how chromebooks do software upgrades with dual "OS" disk-partitions and the ability to rollback to the previous OS-partition.

Question: is something like this also possible on one of the major linux distros? (debian, ubuntu, rocky, ...) What would be the procedure to do this kind of "dual partition" system-upgrade?

(*) a great video that explained some of the technical details in a very clear way, including some very interesting 'lessons learned' and "what if"s If you ever need to explain crowdstrike to your manager, this video is a good start.

[-] kristoff@infosec.pub 2 points 9 months ago

Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend's house (and require MFA or a hardware security-key to access it remotely)

[-] kristoff@infosec.pub 4 points 9 months ago

The issue is not cloud vs self-hosted. The question is "who has technical control over all the servers involved". If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!

[-] kristoff@infosec.pub 3 points 1 year ago

The question is .. do we care about THAT 80 % of the people. I would be more then happy if we can have that 20 % of more technical-oriented audience :-)

[-] kristoff@infosec.pub 2 points 1 year ago

Hi, Perhaps a stupid question, but what exactly is required to port an OS to a different architecture? OK, there is the boot-process, and low-level language compilers, ... but what else?

How much code has actually to be rewriten, and how much just needs "make" to be recompiled?

Kr.

[-] kristoff@infosec.pub 3 points 1 year ago

Hi,

I have also been thinking about selfhoating a jisti-meet server. Just how easy / difficult is it to selfhost it? Do you run it in docker or natively? Linux or some other OS (FreeBSD)?

Kr.

view more: ‹ prev next ›

kristoff

joined 1 year ago