• 0 Posts
  • 10 Comments
Joined 2 years ago
cake
Cake day: December 25th, 2023

help-circle



  • I really don’t enjoy Linus’ content without context I have to admit.

    He was an absolute dipshit back then and he’s one of the few people I’ve read about who not only acknowledged that but also put effort into changing it - and succeeded.

    Yeah the newer mails are not as funny to third parties anymore but I’m really happy for him and especially the kernel devs around him.





  • Because a security engineer focused on cloud would rightfully say “pod security is not my issue, I’m focused on protecting the rest of our world from each pod itself.”. With AWS as example: If they then analyze the IAM role structures and to deep into where the pod runs (e.g. shared ec2 vs eks) etc. then it would just be a matter of different focus.

    Cloud security is focused on the infrastructure - looks like you’re looking for a security engineer focused on the dev side.

    If they bring neither to the table then I’m with you - but I don’t see how “the cloud” is at fault here… especially for security the world as full of “following the script” people long before cloud was a thing.


  • I see two ways forward: either you’re risk averse and assume internal damages that will highly influence heat transfer or you trust in the automatic protection mechanisms or your CPU.

    Personally I’d toss it but I’m old and I’ve burned more than one CPU back in the days with faulty or wrongly installed coolers.

    I don’t think that the risk is high nowadays but I’m (literally) burned in that regard.

    I’m not even sure it would survive bending back so perhaps try that first and if it breaks completely you don’t even have a decision on your hand :)


  • It’s a question of effort. Sony has a shitload of public presence. For social engineering I can learn many mid level manager names from LinkedIn for example and their infrastructure is necessarily public facing to allow people to work there.

    And that’s not talking about their public web presence and services.

    And now we’ll switch to … You! If I’d try to target you I would have to first find anything from you to actually target.

    Once I have your phone number, public IP or anything that gives me a lead I have to find my way in. And that way in will be because you’ve made a mistake, are lax with your passwords or use an out of date service.

    But that’s like 2/3 of the work I had for Sony as well. And now I see that you’re a student with a net fortune of 50$ and a car from 1989.

    To out it another way: for companies I aim with s rifle as they are a worthy prey. For individual people I use a shotgun and hope something hits something.