social.sour.is
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
phiresky to Programmer Humor@lemmy.ml • 2 years ago

Hacking in 1980 vs Hacking in 2024

lemmy.world

message-square
115
fedilink
1.51K

Hacking in 1980 vs Hacking in 2024

lemmy.world

phiresky to Programmer Humor@lemmy.ml • 2 years ago
message-square
115
fedilink
  • @residentmarchant@lemmy.world
    link
    fedilink
    English
    228•2 years ago

    There’s no way the model has access to that information, though.

    Google’s important product must have proper scoped secret management, not just environment variables or similar.

    • @nomecks@lemmy.world
      link
      fedilink
      112•2 years ago

      There’s no root login. It’s all containers.

      • @SpaceNoodle@lemmy.world
        link
        fedilink
        51•2 years ago

        It’s containers all the way down!

        • @RealFknNito@lemmy.world
          link
          fedilink
          English
          31•2 years ago

          All the way down.

          • magic_lobster_party
            link
            fedilink
            13•2 years ago

            I deploy my docker containers in .mkv files.

            • @RealFknNito@lemmy.world
              link
              fedilink
              English
              1•2 years ago

              deleted by creator

      • @residentmarchant@lemmy.world
        link
        fedilink
        English
        11•2 years ago

        The containers still run an OS, have proprietary application code on them, and have memory that probably contains other user’s data in it. Not saying it’s likely, but containers don’t really fix much in the way of gaining privileged access to steal information.

        • @towerful@programming.dev
          link
          fedilink
          18•2 years ago

          That’s why it’s containers… in containers

          It’s like wearing 2 helmets. If 1 helmet is good, imagine the protection of 2 helmets!

          • @PochoHipster@lemmy.ml
            link
            fedilink
            9•2 years ago

            So is running it on actual hardware basically rawdoggin?

            • 𝒍𝒆𝒎𝒂𝒏𝒏
              link
              fedilink
              6•2 years ago

              Wow what an analogy lol

          • @bobs_monkey@lemm.ee
            link
            fedilink
            6•2 years ago

            What if those helmets are watermelon helmets

        • @dan@upvote.au
          link
          fedilink
          5•2 years ago

          The OS in a container is usually pretty barebones though. Great containers usually use distroless base images. https://github.com/GoogleContainerTools/distroless

          • @Cysioland@lemmygrad.ml
            link
            fedilink
            3•2 years ago

            Ah, so there is something even more barebones than Alpine

            • @FrederikNJS@lemm.ee
              link
              fedilink
              2•
              edit-2
              2 years ago

              Sure, there’s also the scratch image, which is entirely empty… So if your app is just a single statically linked binary, your entire container contents can be a single binary.

              The busybox image is also more barebones than alpine, but still has a couple of basic tools.

      • @Venat0r@lemmy.world
        link
        fedilink
        9•2 years ago

        The containers will have a root login, but the ssh port won’t be open.

        • @UNWILLING_PARTICIPANT@sh.itjust.works
          link
          fedilink
          4•2 years ago

          I doubt they even have a root user. Just whatever system packagea are required baked into the image

        • @FrederikNJS@lemm.ee
          link
          fedilink
          3•2 years ago

          Containers can be entirely without anything. Some containers only contain the binary that gets executed. But many containers do contain pretty much a full distribution, but I have yet to see a container with a password hash in its /etc/shadow file…

          So while the container has a root account, it doesn’t have any login at all, no password, no ssh key, nothing.

    • @SpaceNoodle@lemmy.world
      link
      fedilink
      7•2 years ago

      It does if they uploaded it to github

      • @residentmarchant@lemmy.world
        link
        fedilink
        English
        6•2 years ago

        In that case, it’ll steal someone else’s secrets!

    • @nothacking@discuss.tchncs.de
      link
      fedilink
      4•2 years ago

      Still, things like content moderation and data analysis, this could totally be a problem.

    • Ziglin (it/they)
      link
      fedilink
      1•2 years ago

      But you could get it to convince the admin to give you the password, without you having to do anything yourself.

Programmer Humor@lemmy.ml

!programmerhumor@lemmy.ml

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !programmerhumor@lemmy.ml

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

  • Posts must be relevant to programming, programmers, or computer science.
  • No NSFW content.
  • Jokes must be in good taste. No hate speech, bigotry, etc.
  • 244 users / day
  • 619 users / week
  • 1.79K users / month
  • 10.5K users / 6 months
  • 35.6K subscribers
  • 1.76K Posts
  • 39K Comments
  • Modlog
  • mods:
  • @AgreeableLandscape@lemmy.ml
  • @cat_programmer@lemmy.ml
  • BE: 0.19.3
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org