this post was submitted on 09 Mar 2025
192 points (100.0% liked)

Technology

67338 readers
3842 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 18 points 2 weeks ago (3 children)

Potato, potato....

Whether we call them 'undocumented commands' or a 'backdoor', the affect is more or less the same; a series of high-level commands not listed within the specs, preventing systems engineers/designers from planning around vulnerabilities and their potential for malicious use.

[–] [email protected] 7 points 2 weeks ago

In that case, every stack that you use is riddled with those and we are all hosed. And yet somehow your computer, your phone and the internet keep on working most of the time.

[–] [email protected] 6 points 2 weeks ago (2 children)

The dude that wrote this blog is a goof....

defines backdoor as “relating to something that is done secretly

effectively constitute a “private API”, and a company’s choice to not publicly document their private API

Idiot thinks these are two different things....

Are they are trying to argue that malicious intent is needed to define it as a back door?

Moron..

[–] FanBlade 11 points 2 weeks ago

You’re very smart. I didn’t realize that until you called someone a goof, idiot and moron, but now it’s very clear that you have far superior intelligence.

[–] [email protected] 6 points 2 weeks ago

A backdoor requires malicious intent, otherwise it's just a vulnerability

[–] [email protected] 5 points 2 weeks ago (1 children)

I don't get the downvotes, wether you call it backdoor or private API it's a security hole, and nitpicking on its name won't help fixing it.

[–] [email protected] 1 points 2 weeks ago

It was all positive until the guy below me came in throwing insults. Then people started piling downvotes on both....