• 0 Posts
  • 60 Comments
Joined 2 years ago
cake
Cake day: June 23rd, 2023

help-circle

  • This is fundamentally true. However it is possible to limit the bandwidth of data the employee can exfiltrate.

    Assuming a privileged employee suddenly becomes a bad actor. Private-keys/certs are compromised, any kind of shared password/login is compromised.

    In my case I have a legit access to my company’s web-certs as well as service account ssh-key’s, etc. If I were determined to undermine my company, I could absolutely get access to our HSM-stored software signing keys too. Or more accurately I’d be able to use that key to compile and sign an arbitrary binary at least once.

    But I couldn’t for example download our entire customer database, I could get a specific record, I could maybe social engineer access to all the records of a specific customer, but there is no way I’d be able to extract all of our customers via an analog loophole or any standard way. The data set is too big.

    I also wouldn’t be able to download our companies software source code in it’s entirety. Obviously I could intelligently pick a few key modules etc, but the whole thing would be impossible.

    And this is what you are trying to limit. If you trust your employees (some you have to), you can’t stop them from copying the keys to the kingdom, but you can limit the damage that they can do, and also ensure they can’t copy ALL the crown jewels.




  • the sane response is to go “wow that is awful. the gaming community does indeed contain some terrible people, i am glad to be one of the good ones and will distance myself from this behavior”

    I’d say the saner response is none at all. This seems like a pretty niche community issue somewhere on the internet involving at most <100 people. I doubt anyone here is closer then 3 degrees of separation from anyone involved. Why would you expect any of the outsiders here to “take a stand,” based on incomplete information?




  • Man, you guys just don’t understand that race is not an actual idea

    “you guys” i’m gonna go out on a limb here and say that racists don’t actually exist on lemmy. Leftist understand that “race” was a construct used to divide people based on criteria that aren’t threatening to the status quo. In the US, race exist to make sure that people don’t question the capitalists. In China is exist to make sure people don’t question whatever the inherent power structure that existed at the time “ethnic racism” was defined.
    The point is it doesn’t matter. The purpose of the division was the same and the practical division was equally spurious.






  • PowerCrazy@lemmy.mltoLinux@lemmy.mlSSH as a sudo replacement
    link
    fedilink
    English
    arrow-up
    26
    ·
    edit-2
    1 year ago

    Seems novel. But from a security aspect, if OpenSSH has security vulnerability that allows an unauthenticated user to login, via whatever means, once you are in the system as a non-privileged user, you are now free to use the same vulnerability to get root.

    Basically this exercise is like using two locks that have the same key to open them. If the same key opens them, then a weakness in one, is now a weakness in the other so why bother with two identical locks?







  • PowerCrazy@lemmy.mltoLinux@lemmy.mlHow terminal works
    link
    fedilink
    English
    arrow-up
    8
    ·
    1 year ago

    hahaah. Ok sure you win. Linux TTY’s are absolutely not terminals. Sure they are called terminals, they are for all intents and purposes modern-day terminals with a long and storied history that directly links them to terminals from the 70’s but since they aren’t a physical piece of hardware that electro-mechanically connects to a mainframe, obviously they aren’t really terminals and they should be be called something else.