- 0 Posts
- 25 Comments
qqq@lemmy.worldto Programmer Humor@programming.dev•I wonder if this was made by AI or a shit programmer3·2 months agoYes social engineering can be incredibly effective. I completely agree, but there is a bit of an obsession with it these days and imo it’s over indexed, because at the end of the day the type of social engineering detailed in that report typically just provides access.
In some cases, the target is important enough and has enough organizational power that accessing the network as them is sufficient, but that’s not often the case. What that means is that in those other cases social engineering (which in that report you cited is often just phishing) is providing, typically, internal network access. An attacker will have to move through the network and exploit software typically to continue their attack. There are many points in this chain that the weakness lies in software or configuration. If effort was placed on making those systems better it would likely see better results than hyper focusing on the social engineering, which is significantly more difficult to stop, especially with all of the things you mentioned on the horizon.
My point is then that even if it is a part of 74% of breaches, according to Verizon, it’s not necessarily sufficient and is often paired with software level exploits.
And I know this because my company does plenty of red teaming, and we use social engineering but at the end of the day the more interesting result comes from a software exploit or just abusing a weak configuration.
qqq@lemmy.worldto Programmer Humor@programming.dev•I wonder if this was made by AI or a shit programmer3·2 months agoI have found the exact same type of bug shown here probably over a dozen times, most of those long before AI was writing code.
qqq@lemmy.worldto Programmer Humor@programming.dev•I wonder if this was made by AI or a shit programmer413·2 months agoNot a big fan of the wording here. Plenty of skilled programmers make dumb mistakes. There should always be systems in place to ensure these dumb mistakes don’t make it to production. Especially when related to sensitive information. Where was the threat model and the system in place to enforce it? The idea that these problems are caused by “shit programmers” misses the real issue: there was either no system or an insufficient system to test features and define security requirements.
qqq@lemmy.worldto Programmer Humor@programming.dev•I wonder if this was made by AI or a shit programmer236·2 months agoI work in security and I kinda doubt this. There are plenty of issues just like what is outlined here that would be much easier to exploit than social engineering. Social engineering costs a lot more than
GET /secrets.json
.There is good reason to be concerned about both, but 95% sounds way off and makes it sound like companies should allocate significantly more time to defend against social engineering, when they should first try to ensure social engineering is the easiest way to exploit their system. I can tell you from about a decade of experience that it typically isn’t.
I don’t want to tell you one way or the other because it’s kinda dubious anyway, but if all services run as the same user the need for root is kinda moot when it comes to crossing between services or expanding the scope of an attack. Of course it is better than all things running as root, but if I popped a machine as some “low privilege” user that still had access to all running services I’m not sure I’d care so much about escalating to root.
Woah, no. Sure escaping via a kernel bug or some issue in the container runtime is unexpected, but I “escape” containers all the time in my job because of configuration issues, poorly considered bind mounts, or the “contained” service itself ends up being designed to manage some things outside of the container.
Might be valid to not consider it with the services you run, but that reasoning is very wrong.
qqq@lemmy.worldto Selfhosted@lemmy.world•An Immich LXC came up on community scriptEnglish9·2 months agoLXC is containerization. Both it and Docker are using the same kernel APIs.
qqq@lemmy.worldto Programmer Humor@programming.dev•AI cannot replace humans spiteful spirit2·2 months agoAgreed
qqq@lemmy.worldto Programmer Humor@programming.dev•AI cannot replace humans spiteful spirit10·2 months agoNot really, but I’d probably try to organize those into sub structures where it made sense. A data structure holding the UI state and FFT data all flat is kinda messy imo since it becomes unclear what is actually required where.
qqq@lemmy.worldto Selfhosted@lemmy.world•Plex now want to SELL your personal dataEnglish41·4 months agoI have no skin in this game, but IPs are definitely not anonymous data. Also there is a lot of great info out there about de-anonymizing seemingly random data. Interestingly enough, this is similar to the Netflix prize dataset that was one of the more famous ones. Maybe a good introduction to that would be https://www.schneier.com/blog/archives/2007/12/anonymity_and_t_2.html
qqq@lemmy.worldto Selfhosted@lemmy.world•Plex now want to SELL your personal dataEnglish2·4 months agoNobody is gonna be using a quantum computer to “crack email hashes” of Plex users in a few years… I’m not even sure there is a speedup to hash cracking with quantum computers.
But depending on the hashing algorithm used, it’s likely pretty easy to crack hashes of email addresses today with a normal computer. They’re not particularly high entropy.
QEMU makes it pretty painless to hook up gdb just FYI; you should look into that. I think you can also have it provide a memory mapped UART for I/O which you can use with newlib to get printf debugging
qqq@lemmy.worldto Selfhosted@lemmy.world•I'm guilty of not reading the f..ing documentationEnglish1·4 months agoI feel seen
qqq@lemmy.worldto Programmer Humor@programming.dev•The future of web development is AI. Get on or get left behind.10·5 months agoPretty much everyone I work with uses vim, emacs, sublime, or vscode. I like IDEs and use them for… well Java, but I wouldn’t argue that they’ve made the other tools obsolete or you’re a fool for sticking with the old ones. If it ain’t broke and all that. It actually seems like more people are moving back to pluggable text editors over IDEs
I’ve used AI tools a bit. They’ve really helped drop in code that would previously just be a bunch of TODOs; they get you up and writing the core parts much faster to see if the idea even works. They’ve also really helped answer specific questions or lead me towards the answer. They’ve also straight up lied to me quite a bit. It’s a weird tool.
I think the OP image is pretty wrong with the comparison it makes. LLMs/AI are a class of technology that are most definitely not going anywhere unless something dramatic happens. Some people, myself included, feel uneasy about the way they’re created and the fact that people in powerful positions completely misunderstand them, and I think that leads to the hope that they’re just a fad.
Could be a variable from somewhere else in the code. It should throw type error of some sort if it’s not going to handle a float correctly
qqq@lemmy.worldto Programmer Humor@programming.dev•The devil said, “Take this glyph-laden grimoire and try to render it cross-platform.”1·6 months agoTIL I didn’t realize Java used UTF16 for its internal representation. Looks like it’s a bit more complicated than that after Java 9 too
qqq@lemmy.worldto Programmer Humor@programming.dev•The devil said, “Take this glyph-laden grimoire and try to render it cross-platform.”6·6 months agoAndroid defaults to UTF16
In some build modes clang will simply put a trap where it sees undefined behavior. https://clang.llvm.org/docs/UndefinedBehaviorSanitizer.html
Not saying your wrong, just a fun fact I guess
Not exactly “memory address 0”; there be dragons there. https://c-faq.com/null/index.html