• 0 Posts
  • 17 Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle


  • This wouldn’t be conclusive since it would be pretty easy to just hide these payloads in some other traffic stream to a compromised node, which is a super common way cyberthreat command and control functions. If the user never initiates a connection to the host, the payloads just wait around so as not to generate suspicious traffic.

    Obviously the threat model for advertising is a bit different, but there’s no reason someone trying to hide this functionality wouldn’t take similar steps.









  • This has always been the case. Maybe I work in a unique field but we spend a lot of time duplicating functionality from open source and not linking to it directly for specifically this reason, at least in some cases. It’s a good compromise between rolling your own software and doing a formal security audit. Plus you develop institutional knowledge for that area.

    And yes, we always contribute code back where we can.




  • Meh, I’m not the one aggressively trying to shut down any conversation which doesn’t go hard enough on ML fan service. I actually came to .ml at first hoping to find a more academically oriented leftist community which was willing to engage with topics other than “let’s relitigate the cold war.”

    You are obviously free to dismiss any criticism of this community as “NATO chauvinist propaganda” or whatever, just as im free to roll my eyes and say that the world deserves a better class of socialist.