• 1 Post
  • 105 Comments
Joined 3 years ago
cake
Cake day: June 6th, 2023

help-circle
  • I’m in software. The company gives us access and broadly states they’d like people to find uses for it, but no mandates. People on my team occasionally find uses for it, but we understand what it is, what it can do, and what it would need to be able to do for it to be useful. And usually it’s not.

    If I thought anyone sent me an email written with AI, I would ask them politely but firmly to never waste my time like that again. I find using AI for writing email to be highly disrespectful. If I worked at a company making a habit out of that, I would leave.



  • Hah yeah, I’ve definitely pulled the plug on my router before because I wasn’t sure what I was seeing.

    I mean, cybersecurity I would consider to be a research field. In practice, yeah, it’s a bunch of people just doing their best.

    I tend to keep everything inside my network and only expose what I need visible on non standard ports, one of those being a VPN. It’s not that I couldn’t run these services public facing, it’s that the people taking the time to constantly update, configure, and auditing everything full time to head off red team are being paid. I don’t need to deal with an attack surface any larger than it needs to be, ain’t nobody got time for that.


  • The ability to generate a bunch of traffic that looks like it’s coming from legit, every-day residential IPs is invaluable to disinformation campaigns. If they can get persistence in your network, they can toss it into a bot net which they’ll sell access to on the dark web.

    A sucker opens insecure services to the open internet every day, that’s free real estate to bot farms. Only when the probability of finding them is low enough is it not worth the energy/network costs. I think hosting on non-standard ports is probably correlated with lowering that probability below some threshold where it becomes not worth it…don’t quote me, though.

    At the end of the day, the rule is not to depend on security by obscurity, but that doesn’t mean never use it.