this post was submitted on 17 Aug 2024
308 points (100.0% liked)

Technology

69449 readers
3222 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 89 points 8 months ago* (last edited 8 months ago) (1 children)

And violating [an app's] terms of service puts you in jeopardy under the Computer Fraud and Abuse Act of 1986, which is the law that Ronald Reagan signed in a panic after watching Wargames (seriously!).

I watched it two days ago, that's tragicomic.

[–] [email protected] 31 points 8 months ago* (last edited 8 months ago) (4 children)

I know, right? Like how the hell do you get worried from such a silly movie.. Unless he knew the us military defense systems were in fact that weak, against people and their telephones.

Nah, Reagan was just a wuss.

[–] [email protected] 28 points 8 months ago (5 children)

Of all the things that happen in the movie, the thought that someone will have hooked a top-secret defense computer up to a modem is the one that is the absolute most believable.

Like, it's entirely going to have happened at some point.

[–] [email protected] 5 points 8 months ago

I kind of expect it to be required, SCADA has had plenty of ancestry. But you'd expect the NSA to have been consulted on how to prevent interaction with the general public..

load more comments (4 replies)
[–] leftzero 25 points 8 months ago (1 children)

The story goes that, after watching the film, Reagan asked the chairman of the joint chiefs of staff ”Could something like this really happen? Could someone break into our most sensitive computers?”, and, after looking into it for a week, the general came back with the reply “Mr. president, the problem is much worse than you think.”, which prompted Reagan into setting off a series of interagency memos and studies that led to the signing of classified national security decision directive NSDD-145, “National Policy on Telecommunications and Automated Information Systems Security.”.

So... yeah, things probably actually were that bad, or even worse (except for the AI bit, of course).

[–] [email protected] 9 points 8 months ago (1 children)

Has there ever, once, been an infosec issue that doesn't result in an investigation and someone then going 'oh my god, this is worse than anyone could have imagined'?

Teaching rocks to do math was a terrible, terrible idea.

[–] [email protected] 5 points 8 months ago

If it wasn't an infosec issue (because no math rocks), it would be an opsec or comsec issue. We're the weak link unfortunately.

[–] [email protected] 16 points 8 months ago (2 children)

also, just imagine the threat was that defense systems could be invaded by your average citizen.

Let's put resources to making them secure then, right? Nah, let's just make it illegal to guess passwords. That will surely prevent bad things from happening.

load more comments (2 replies)
[–] [email protected] 15 points 8 months ago* (last edited 8 months ago) (2 children)

The nuclear codes for decades was 00000000. That's all you needed to launch nukes.

Our cyber security was atrocious

[–] [email protected] 8 points 8 months ago

At least now it's 00000000!123

[–] [email protected] 3 points 8 months ago

Maybe it's my ADHD, but I actually feel much better (very light and easy) reading such things. Nukes with zero launch codes, laws being made after watching movies for teens, Soviet caliber differences intended to make Soviet ammunition just a bit too large to be usable by the potential enemy, BTR-1 being basically a transport so that infantry wouldn't die while traversing nuked land, thus with no real protection against anything, and so on.

I mean, nuking another country by mistake is better than not nuking it when necessarily, or so someone judged. But some other people wanted some protection against fools, so theoretically they had that.

[–] [email protected] 62 points 8 months ago (3 children)

The last time Congress managed to pass a federal consumer privacy law was in 1988: The Video Privacy Protection Act. That’s a law that bans video-store clerks from telling newspapers what VHS cassettes you take home. In other words, it regulates three things that have effectively ceased to exist.

Corey Doctorow always hits so hard

[–] [email protected] 25 points 8 months ago (2 children)

And even though it's being labeled as a "consumer privacy law" it was actually spurred by a politician getting upset that people might find out what he was renting. It was a self-serving law that had the side effect of also helping consumers.

[–] [email protected] 19 points 8 months ago (1 children)

Wasn't it because a couple of anti-porn politicians were outed as having renting porn tapes (yet another thing that doesn't really exist anymore)

[–] [email protected] 9 points 8 months ago (1 children)

IIRC that was what happened.

load more comments (1 replies)
load more comments (1 replies)
load more comments (2 replies)
[–] [email protected] 39 points 8 months ago (1 children)

Great read. Great summation of the last 30+ years.

Longer than I wanted to keep reading, not dissatisfied that I kept reading.

[–] [email protected] 9 points 8 months ago (2 children)

Thanks for your comment, it encouraged me to actually read the article and I completely agree. Long but worth the read

[–] [email protected] 6 points 8 months ago

And your comment encouraged me to immediately read the entire thing haha

[–] [email protected] 5 points 8 months ago* (last edited 8 months ago)

Always sweet to see folks incentivize each other to engage with content!

For anyone still daunted by the article, I expect the DEFCON channel will upload this talk soon, which might be more up your alley.

[–] [email protected] 37 points 8 months ago (6 children)

Let me save you the time and summarize the blog post - internet got worse, big tech is bad and the author is just ranting how bad it is nowadays. Nothing new, no idea how to fix it, just complaining about the modern world.

I'm not saying the author is wrong. It's just I heard this many times before.

[–] [email protected] 76 points 8 months ago (1 children)

You didn't read it. Also why is it when someone takes time to address an issue like this, there is guarantee a post like this to dismiss it in favor of basically doing fuck all. Like the implication here is that you're trying to diminish the effort for what? What's the reason when you didn't even read it.

load more comments (1 replies)
[–] [email protected] 58 points 8 months ago (1 children)

The entire second half of the column is literally how to fix it.

[–] [email protected] 6 points 8 months ago (3 children)

I think we have read a different blog post. There was something about Google's antitrust thingy and that all big tech should be regulated but no straight solution were given.

Again, I agree withe the thesis but honestly, anyone who's focused on privacy would tell you the same but in way fewer words.

BTW, similar issue was raised in The Age of Surveillance Capitalism. Pretty good read.

[–] [email protected] 24 points 8 months ago

You think Cory Doctorow isn't focused on privacy?

[–] [email protected] 10 points 8 months ago (1 children)

anyone who’s focused on privacy would tell you the same but in way fewer words.

Corey Doctorow literally wrote the books on privacy. He coined the term Enshitification. He's even been portrayed as a guest character in a couple of XKCD comics. Generally he's someone to listen to on anything security, privacy or tech policy related

[–] [email protected] 3 points 8 months ago

No, fart_pickle knows all.

[–] [email protected] 3 points 8 months ago

There was 2,177 words in the "how to fix" portion of the blog post, you dumbass.

[–] [email protected] 53 points 8 months ago

The author of this post, Cory Doctorow, literally coined the term “enshittification” in a prior blog post. I think he of all people is allowed to continue talking about the topic as much as he wants.

[–] [email protected] 30 points 8 months ago (1 children)

The article proposes restoring competition, regulation, interoperability and tech worker power as response; in case anyone was wondering.

[–] [email protected] 7 points 8 months ago (1 children)

And the solution for world hunger is to distribute food from rich countries into the poor countries. Here, I've fixed the famine issue. Do you get my point? It's easy to say what to do but when it comes to the details, all those preachers fail short in giving the real solution to the real problem. As I said before, this is just a rant about how bad modern world is.

[–] [email protected] 7 points 8 months ago

These are problems that require legislative action to fix, which is why he is encouraging the nerds and hackers who will be most affected by tech policy and understand the tech the most to start meeting with their legislators to discuss tech policy as it comes up for votes

[–] [email protected] 19 points 8 months ago* (last edited 8 months ago) (2 children)

When software changes in a way the user dislikes there's often no choice but to put up with it or stop using it, because it's proprietary. I think this could be fixed if people were to adopt the value of free software and began to ditch proprietary software.

[–] [email protected] 5 points 8 months ago (1 children)

There's nothing wrong with proprietary software as long as it's respects user's privacy and doesn't do crazy licensing stuff.

[–] [email protected] 11 points 8 months ago (3 children)

It is very difficult to tell if a program is respecting user's privacy without the source code to verify what it's actually doing. When you can't see or change what it does then the developer is the one in control of the computing, and even a good intentioned dev will have to resist the temptation to gain at the user's expense.

load more comments (3 replies)
[–] [email protected] 3 points 8 months ago

Just ratted on yourself and dipped, huh?

[–] [email protected] 34 points 8 months ago (1 children)

I'm waiting until someone invents antidisenshittificationism

[–] [email protected] 17 points 8 months ago (1 children)

I think you just did. Good job, you get a cookie 🍪

[–] [email protected] 15 points 8 months ago (2 children)

Is this a third party cookie?

[–] [email protected] 4 points 8 months ago
[–] [email protected] 3 points 8 months ago

Yes, we are monitoring

[–] [email protected] 14 points 8 months ago (1 children)

The telephone jumped the shark a few years ago. Now no one expects using the phone for legit business. Now it's email.

[–] [email protected] 4 points 8 months ago

I ask everyone I give my number to to text me first so I can verify

[–] [email protected] 5 points 8 months ago (1 children)

The solution is to reject any monetization of anything online. Anti advertise. If a content creator has ads take a minute to talk about how the product is the worst. Maybe it started a fire from a friend of a friend basement and killed their whole family. Maybe it made someone you know infertile. If a marketing team acts like a celebrity to promote rampart, you do what we all did in the rampart ama no matter what it is. Reject anyone trying to monetize and capitalize on the internet until all the assholes that running ever other medium leaves.

load more comments (1 replies)
[–] [email protected] 3 points 8 months ago* (last edited 8 months ago) (1 children)

Amazon used to sell products, not Shein-grade self-destructing dropshipped garbage from all-consonant brands.

I knew it wasn't just my imagination. Amazon has been filled with cheap Chinese knock-off brands in recent years, to the point where I may as well be using Temu or Wish for a bargain.

If you went from the internet's storefront to an upmarket AliExpress, that's not a good sign.

load more comments (1 replies)
load more comments
view more: next ›