It’s really great how docker shifted the problem from “works on my machine” to “works with my version of docker”.
optional
- 0 Posts
- 5 Comments
Joined 1 year ago
Cake day: April 8th, 2024
You are not logged in. If you use a Fediverse account that is able to follow users, you can follow this user.
You mean right vs. wrong?
I don’t just rethink my programming decision but all my life decisions every night. Seem like Rust is the perfect language for me.
optional@sh.itjust.worksto Cybersecurity@sh.itjust.works•Windows 11 BitLocker Bypassed to Extract Encryption KeysEnglish9·6 months agoWhat’s the advantage of disk encryption if you don’t require a password to boot? Couldn’t you just boot the device and extract the data using Explorer anyway?
It was xz, a software most people probably use without even knowing it as it is a library which is included in a lot of other projects. The vulnerability targeted openssh which is one of these users.
That being said: Do you also audit the dependencies of the software you’re installing? I usually don’t, unless a customer pays me for it. However, before I pull any dependency into one of my own projects I take a look at it’s dependencies. If a library for a simple task brings tons of dependencies with it, I rather not use it.