• 0 Posts
  • 124 Comments
Joined 2 years ago
cake
Cake day: December 29th, 2023

help-circle

  • you’re on programming.dev so i assume you know that secrets is a generic term to cover things like your cloud account login (whatever form that may take - a password, token, api key, etc) for the robot vacuum service and you’re being intentionally obtuse

    it’s a realistic attack scenario for some people - think celebrities etc, who might be being targeted… if someone knows what type of vacuum you have, it’s not “carefully take apart” - it’d take 30s, and then you have local network access which is an escalation that can lead to significantly more surveillance like security cameras, and devices with unsecured local access

    just because it doesn’t apply to you doesn’t mean it doesn’t apply to anyone… unsecured or default password root access, even with physical access, is considered a security issue





  • Pup Biru@aussie.zonetoMemes@sopuli.xyzI ain't risking shit
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    5 days ago

    that’s about phones in general… they mention iphone once, and that’s about the 1 phone that led to them catching the criminals (which i’d say is a check in the box of “stealing iphones is useless”)

    iphones in apple stores as display models are not standard iphones: they lock down and turn themselves into only a tracker the instant they leave the apple store

    and it’s basically useless to steal an iphone in most cases anyway, because an iphone gets registered to an apple account, and if a phone is already registered you just can’t use it

    even parting it out the huge majority of parts - especially anything even a little bit expensive - has essentially DRM on it that talks to iOS… when you add a genuine apple part to an iphone, iOS checks to see if it’s already been registered to another phone and just won’t proceed with stolen parts

    the best you could do is use it or the parts as a prop in some secondary scam



  • that’s pretty disingenuous though… individual lemmy instances go down or have issues regularly… they’re different, but not necessarily worse in the case of stability… robustness of the system as a whole there’s perhaps an argument in favour of distributed, but the system as a whole isn’t a particularly helpful argument when you’re trying to access your specific account

    centralised services are just inherently more stable for the same type of workload because they tend to be less complex, less networking interconnectedness to cause issues, and you can focus a lot more energy building out automation and recovery than spending energy repeatedly building the same things… that energy is distributed, but again it’s still human effort: centralised systems are likely to be more stable because they’ve had significantly more work put into stability, detection, and recovery




  • i think they’re 2 different, but equally important things to protect against

    shit companies using your information is almost guaranteed so you want to protect against that, but FDE does nothing for that

    but losing your laptop with an unprotected disk can be catastrophic for your life… your entire browser session (so probably your email, and therefor password resets and confirmations), any cloud (or self hosted storage with saved credentials) storage that you have… idk about you, but the contents of my disk are plenty to steal my identity even without needing to social engineer, and with my email and other bits of info that’s plenty to social engineer probably anything up to and including a passport

    training an LLM on chats might make you feel dirty, but an unencrypted disk can ruin your life for years and cause problems potentially forever


  • corpos aren’t who you’re protecting against with encrypted drives… they’re not going to gain access to anything via bypassing your OS: they get everything via software you’ve installed or things like tracking

    the main thing you’re protecting against with encryption is theft (or if you think you’re being physically targeted, it also stops them from modifying your system… eg replacing your kernel or a binary that gives them access somehow)






  • the thing that everyone always glosses over is that jellyfin should not be run on a public network. it has known security vulnerabilities… that includes VPN remote proxy, so now you have to have external users on your actual VPN, and if that’s the case then plex will work fine because it’s “local”, and has a lot more features

    (and my main issue: media segments don’t work on swiftfin)