nonstopshirtflutter

joined 2 years ago
[–] [email protected] 3 points 2 years ago

I still think it’s a very powerful image, and portrays well how Ukraine must have felt after the meeting. One of the best journalistic images I have seen for a long while, precisely because the composition paints a story that is emotionally true, but in reality was just a short, inconsequential moment.

This image would have little value if Ukraine left the event happy with the results, feeling confident in their allies and NATO. Then it would be emotionally untrue as well.

[–] [email protected] 7 points 2 years ago

There are many complex cultural and economical aspects which none of amount for any reason for any sane person. But in that way the complexity is inherently linked to Kremlins unique brainworms and natural stupidity.

It would have been similarly insanely stupid to attack Finland, or Japan, or North Korea. So to draw distinctions to those, trying to understand the biology of Russian brainworms is relevant to the conflict. But no explanation will change the fact Russian decisions are made based on poverty and stupidity.

[–] [email protected] 1 points 2 years ago

I didn’t know Specter or Meltdown can be exploited through a website, that’s good to know.

I should have been more specific on this issue: old hardware is much less common to exploit than old OS or software, so buying new hardware for the sake of hardware security might not be necessary for ones threat scenario. However if there is a risk of a malicious actor accessing or stealing the hardware, then the hardware is definitely relevant.

Similarly I do think one can do a lot with old hardware if they can find a usecase with less needed privileges.

[–] [email protected] 11 points 2 years ago (3 children)

This depends on your threat model and circumstances:

Old versions of OS are generally a security risk.

Old hardware may lack some modern security features near the hardware level. However these usually protect against tampering with BIOS or bootloaders. In general threats like this need physical access to the machine. I don’t know much about TPM and keystorage in general, but those are what this might concern.

Other than that, old networking hardware might have vulnerabilities that are either not patched with software or are impossible to path. This extends to any device and all device-drivers, but network-devices to me sound the most exposed surface.

This risk however depends on not just the device but the usage as well. If you use it inside a local network, you lose a layer of defence. If you use it in an untrusted network, you are exposed directly.

I would usually not be concerned about old hardware as long as it can run a modern OS I trust. This means most laptops are fine, but phones not so much.

Especially phones with no access to patched applications become less and less secure as time goes by. Old hardware is a small risk; old OS is a concern; old browser on said old OS and you can bet there is at least one serious, well-known and already used vulnerability.

I’m personally tinkering with an old 4th-gen iPad, hoping to secure it or at least jailbreak it. However I am not expecting it to ever be a safe device after that, but a glorified IOT device.

[–] [email protected] 1 points 2 years ago (1 children)

diesel is nonflammable under normal atmospheric pressure