Ask Lemmy
A Fediverse community for open-ended, thought provoking questions
Please don't post about US Politics. If you need to do this, try [email protected]
Rules: (interactive)
1) Be nice and; have fun
Doxxing, trolling, sealioning, racism, and toxicity are not welcomed in AskLemmy. Remember what your mother said: if you can't say something nice, don't say anything at all. In addition, the site-wide Lemmy.world terms of service also apply here. Please familiarize yourself with them
2) All posts must end with a '?'
This is sort of like Jeopardy. Please phrase all post titles in the form of a proper question ending with ?
3) No spam
Please do not flood the community with nonsense. Actual suspected spammers will be banned on site. No astroturfing.
4) NSFW is okay, within reason
Just remember to tag posts with either a content warning or a [NSFW] tag. Overtly sexual posts are not allowed, please direct them to either [email protected] or [email protected].
NSFW comments should be restricted to posts tagged [NSFW].
5) This is not a support community.
It is not a place for 'how do I?', type questions.
If you have any questions regarding the site itself or would like to report a community, please direct them to Lemmy.world Support or email [email protected]. For other questions check our partnered communities list, or use the search function.
Reminder: The terms of service apply here too.
Partnered Communities:
Logo design credit goes to: tubbadu
view the rest of the comments
Cyber security stuff, but like the nitty gritty details and technical stuff. It's something I'm really passionate about, but if anyone brings up something and I start going into details, their eyes glaze over.
I guess most people like the headline, tldr version only. Lol
I'm not deep in the topic, but I have done some security hardening for embedded devices. Whatever you have to share, I'd love to hear it!
There's so much lol. I used to be a security software engineer. But people never fucking listen and will constantly fight you so I just gave up and went back to just software engineering.
At my job before last I told them we needed to enforce HTTPS and they said, but what if someone can't use HTTPS for some reason?
This was an app that held tons of protected health information. I jumped ship as soon as I found another job.
Oh man, an HTTPS certificate should absolutely be required for that. Even aside from hackers, I don't want my ISP to be able to read that stuff! Very disappointing.
Oh my god this is why we can't have nice things ffs
You might find this interesting: https://www.youtube.com/watch?v=zP4b3pw94s0
It's a blackhat talk that talks about vulns in proxies and reverse proxies ^.^, as well as much of their weird behaviour.