• Ogmios@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    1
    ·
    edit-2
    4 months ago

    And then once you start to understand the ways that ideas are corrupted by hacks, you can start to see the same sort of behaviour even when it has an official stamp of approval from an ostensibly legitimate organization. Take the ‘cybersecurity’ grift, for example, in which technical wizards pretend that they can definitively secure your vital computer systems, even with an always-on Internet connection, if you give them enough money.

    • fishpen0@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      With a magic one size fits all solution that happens to also be a rootkit that by default rewrites itself on automatic updates.

      If you’re still with me please read about EBPF and why it can be used to do EDR style monitoring without a rootkit on any modern flavor of Linux. It can also be used to replace your monitoring and observability stack shims in your product. It was built by kernel developers and is already baked into your OS.

      • Ogmios@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        arrow-down
        2
        ·
        4 months ago

        The man behind the curtain is the intentional problems that are baked into your hardware, like how phones have a battery that can’t be disconnected from the wireless devices at all.