Cory Doctorow's linkblog · @pluralistic
45332 followers · 43240 posts · Server mamot.fr

Making content for an algorithm is like having a boss that docks every paycheck because you broke rules that you are not allowed to know, because if you knew the rules, you'd figure out how to cheat without your boss catching you. Content moderation is the last place where is considered good practice:

doctorow.medium.com/como-is-in

4/

#securitythroughobscurity

Last updated 1 year ago

Kevin Karhan :verified: · @kkarhan
1319 followers · 90688 posts · Server mstdn.social

@md @bmi @bsi 's is so that it's trivial to crack with any modern , because it's makes all the versions as weak as on .

But then again noone pays me to fix it, so it's not my problem.

Spoiler: The proper fix is to abolish all shit and demand a fully 'd communications system, since everything else violates and is thus inherently and unfixably insecure by design!

#kerckhoffsprinciple #OpenSource #proprietary #dvb #csa #Tea #securitythroughobscurity #gpgpu #weak #Crypto #tetra

Last updated 1 year ago

Cory Doctorow's linkblog · @pluralistic
41544 followers · 41633 posts · Server mamot.fr

Amazon will doubtless claim that disclosing how those systems work will make it easier for spammers and scammers to game their way to the top of search results. We should be skeptical of this claim - content moderation is the last domain where anyone takes the bankrupt idea of seriously:

doctorow.medium.com/como-is-in

33/

#securitythroughobscurity

Last updated 1 year ago

Cory Doctorow's linkblog · @pluralistic
40452 followers · 38614 posts · Server mamot.fr

Finally, there's the question of Proctorio's security. Proctorio argued that by publishing links to its educator materials, Linkletter weakened the security of its products. That is, they claim that if students know how the invigilation tool works, it stops working. This is the very definition of "," and it's a practice that every serious infosec professional rejects.

32/

#securitythroughobscurity

Last updated 1 year ago

JL Johnson :veri_mast: · @User47
461 followers · 2481 posts · Server vmst.io

@bragi @AirlineReporter @leo I guess there were only 9 versions and some dummy let a newspaper take and post a photo of them. 🙄

#securitythroughobscurity

Last updated 1 year ago

Cory Doctorow's linkblog · @pluralistic
38870 followers · 35919 posts · Server mamot.fr

For one thing, the rules change all the time, as the platforms endlessly twiddle the knobs that determine what gets shown to whom:

doctorow.medium.com/twiddler-1

And they refuse to tell anyone what the rules are, because if they told you what the rules were, you'd be able to bypass them. is the only domain where "" doesn't get laughed out of the room:

doctorow.medium.com/como-is-in

17/

#contentmoderation #infosec #securitythroughobscurity

Last updated 1 year ago

Cory Doctorow's linkblog · @pluralistic
35355 followers · 34263 posts · Server mamot.fr

Working for the platform can be like working for a boss who takes money out of every paycheck for all the rules you broke, but who won't tell you what those rules are because if he told you that, then you'd figure out how to break those rules without him noticing and docking your pay. is the only domain where is considered a best practice:

doctorow.medium.com/como-is-in

21/

#contentmoderation #securitythroughobscurity

Last updated 2 years ago

@SwiftOnSecurity
I knew someone who regularly conducted cash business transactions. They'd never carry it in its own bag. It'd be buried hidden within a bag of something else innocuous & not cash associated that was totally normal to shop for and carry as an errand by the individual, time, and day.

Daily baguettes can be valuable...

#securitythroughobscurity

Last updated 2 years ago

jesterchen42 · @jesterchen
309 followers · 713 posts · Server social.tchncs.de

Speaking of companies: should internal resources be resolvable using external ? What points should be considered in terms of , and ?

Is using split DNS or prevention of information gathering?

#securitythroughobscurity #management #risk #operations #security #dns

Last updated 2 years ago

Gergely Imreh · @imrehg
59 followers · 307 posts · Server fosstodon.org

@bignose yeah, that's probably fair. And also not having all the used subdomains listed is more of play, if I need to keep any of them secure, better do it regardless of of the the information about the existence of that subdomain being widely or narrowly distributed.

The "make a cert per subdomain" might be easy, while it also cuts against the "limit the number of moving pieces" aspect of administration, that I believe in (not to the extreme, but still).

#securitythroughobscurity

Last updated 2 years ago

Aaron C · @aconaway
149 followers · 739 posts · Server masto.ai

@damien I just keep all my creds in a separate public Github repo called "Definitely not my creds".

#securitythroughobscurity

Last updated 2 years ago

Cory Doctorow's linkblog · @pluralistic
29346 followers · 32243 posts · Server mamot.fr

It's as if your boss handed you a paycheck with only half your pay in it, and when you asked what happened to the other half, your boss said, "You broke some rules so I docked your pay, but I won't tell you which rules because if I did, you might figure out how to break them without my noticing."

Content moderation is the only part of information security where is considered good practice:

doctorow.medium.com/como-is-in

28/

#securitythroughobscurity

Last updated 2 years ago

Daru003 · @daru003
20 followers · 61 posts · Server infosec.exchange

Trying to hide the existence of a wireless network by disabling SSID broadcasting is not a true mechanism of security.

#wifi #security #securitythroughobscurity

Last updated 2 years ago