And then once you start to understand the ways that ideas are corrupted by hacks, you can start to see the same sort of behaviour even when it has an official stamp of approval from an ostensibly legitimate organization. Take the ‘cybersecurity’ grift, for example, in which technical wizards pretend that they can definitively secure your vital computer systems, even with an always-on Internet connection, if you give them enough money.
With a magic one size fits all solution that happens to also be a rootkit that by default rewrites itself on automatic updates.
If you’re still with me please read about EBPF and why it can be used to do EDR style monitoring without a rootkit on any modern flavor of Linux. It can also be used to replace your monitoring and observability stack shims in your product. It was built by kernel developers and is already baked into your OS.
The man behind the curtain is the intentional problems that are baked into your hardware, like how phones have a battery that can’t be disconnected from the wireless devices at all.
And then once you start to understand the ways that ideas are corrupted by hacks, you can start to see the same sort of behaviour even when it has an official stamp of approval from an ostensibly legitimate organization. Take the ‘cybersecurity’ grift, for example, in which technical wizards pretend that they can definitively secure your vital computer systems, even with an always-on Internet connection, if you give them enough money.
With a magic one size fits all solution that happens to also be a rootkit that by default rewrites itself on automatic updates.
If you’re still with me please read about EBPF and why it can be used to do EDR style monitoring without a rootkit on any modern flavor of Linux. It can also be used to replace your monitoring and observability stack shims in your product. It was built by kernel developers and is already baked into your OS.
The man behind the curtain is the intentional problems that are baked into your hardware, like how phones have a battery that can’t be disconnected from the wireless devices at all.