You know it’s stuff like this that forces me to rewrite dns on the firewall, but that’s probably not even possible if they use DNS over TLS.
You know it’s stuff like this that forces me to rewrite dns on the firewall, but that’s probably not even possible if they use DNS over TLS.
A software shouldn’t use passwords for tls, just like before you use submit your bank password your network connection to the site has been validated and encrypted by the public key your client is using to talk to the bank server, and the bank private key to decrypt it.
The rest of the hygiene is still up for grabs for sure, IT security is built on layers. Even if one is broken it shouldn’t lead to a failure overall. If it does, go add more layers.
To answer about something like a WiFi pineapple: those man in the middle attacks are thwarted by TLS. The moment an invalid certificate is offered, since the man in the middle should and can not know the private key (something that isn’t used as whimsically as a password, and is validated by a trusted root authority).
If an attacker has a private key, your systems already have failed. You should immediately revoke it. You publish your revokation. Invalidating it. But even that would be egregious. You’ve already let someone into the vault, they already have the crown jewels. The POS system doesn’t even need to be accessed.
So no matter what, the WiFi is irrelevant in a setup.
Being suspicious because of it though, I could understand. It’s not a smoking gun, but you’d maybe look deeper out if suspicion.
Note I’m not security operations, I’m solutions and systems administrations. A Sec Ops would probably agree more with you than I do.
I consider things from a Swiss cheese model, and rely on 4+ layers of protection against most understood threat vendors. A failure of any one is minor non-compliance in my mind, a deep priority 3. Into the queue, but there’s no rush. And given a public WiFi is basically the same as a compromised WiFi, or a 5g carrier network, a POS solution should be built with strengths to handle that by default. And then security layered on top (mfa, conditional access policies, PKI/TLS, Mdm, endpoint health policies, TPM and validation++++)
Seems like you should submit a change request with your fixes?
Transport layer security should mean this shouldn’t matter. A good POS shouldn’t rely on a secure network, the security should already be built in cyptographically at the network session layer. Anything else would still have the same risk vector, just a lower chance of happening.
In fact many POS systems happily just take a 4g/5g sim card because it doesn’t matter what network they’re on.
I knew a Datacenter that had hundreds of ps3s for rendering fluid simulation and other such things that at the time were absolutely cutting edge tech. I believe F1 and some early 3d pixar stuff was rendered on those farms. But like all things, technology marched on. fpgpas and cuda have taken that space.
Cell definitely was heavily used by specialist/nichr industry though.
I wonder if I can find you some link to explain it better than the rumours I heard from staff that used to work in those datacentres.
Hmm hard to find commercial applications, probably individuals might have blogged otherwise here’s what I’m talking about: https://en.m.wikipedia.org/wiki/PlayStation_3_cluster
Hate to break it to you, but most IT Managers don’t care about crowdstrike: they’re forced to choose some kind of EDR to complete audits. But yes things like crowdstrike, huntress, sentinelone, even Microsoft Defender all run on Linux too.
Well, what I really wonder is if because the kernel can include it, if this will make an install more agnostic. Like literally pull my disk out of a gaming nvidia machine, and plug it into my AMD machine with full working graphics. If so this is good for me since I use a usb-c nvme ssd for my os to boot from on my work and home machines and laptops for when I’m not worrying. All three currently have nvidia cards and this works ok. I have some games to chill and take a break. My works core OS for work MDM etc unmodified. I like it that way.
I realise this is not a terribly useful case, but I could see it for graphically optimised VM migrations too not that I have many. Less work in transitioning gives greater flexibility.
Eating the onion is sure popular today!
Fundamentally what the alternative is, is to propose that you remain the sole owner of your privacy at the cost of sharing with advertisers that you have, say, 6 generic topics you’re interested in. Like motorsports. It, with the millions or billions of others looking. The ad tracking currently knows everything about everyone and then works out if motorsports is an effective ad for you individually based on their profile of you.
For me, I’m fine with the current system. For my family though, they’re just using phones and tablets with their default browser, blissfully unaware that there’s no privacy. Then their data gets leaked out.
I know it’s an extreme kind of case, but domestic abuse victims are always my thought when you think of a counter to “well I’ve got nothing to hide”. Those people if they’re unsure about privacy, will err on the side of caution. They stay trapped.
In conclusion, I’d rather move the needle forward for those who are at risk. Those who installing anti-tracking plugins would put at further risk. Where installing odd browsers make them a target. We can find perfection later. Make the Web safer now.
Plenty of people could justifiably take the opposite stance. But even just for my grandparents, they shouldn’t be tracked the way they are. They’re prime candidates for scams, and giving away privacy is one data leak away from a successful scam.
Kind of off topic to what you said I realise. :)
Ah you’re thinking I’m reading your other comments to other people.
BTW HIPAA is for providers for their patients information handling. Once it’s in the person’s hands, it’s no longer under HIPPA and it no longer applies. If you decide to put your private medical information on a commercial advertisement board on a highway, and it’s not breaking laws to do with acceptable adcertisement (eg gore or smut) you’ll be able to do that to.
Basically theres no expectation for a individual person to adhere to HIPPA for their own personal information storage and it doesn’t apply.
My assumption with your lawyer comment, is this was a insurance or otherwise medical malpractice lawyer who might collect this information for their client cases, since without having client/patient requirements, HIPPA is irrelevant.
The moment a lawyer saves their medical records in a way that unintentionally and without their consent uploads them to OneDrive, they have a pretty solid case to charge Microsoft for a HIPAA violation
Are we talking about the same comment?
You should be, if you’re in a work computer with privileged documents, controlling it with an appropriate level of care. No matter Linux or Windows. If you’re using home and defaults, you’ve failed no matter what.
https://www.hipaajournal.com/onedrive-hipaa-compliant/#
Totally feasible to use onedrive.
However I’ve got no sympathy for even a small business to use IT without someone configuring their system in a way that controls this. A lawyer of all people know that knowledge is worth something.
Though I agree, you’re trading problems: https://www.forbes.com/2009/05/09/japan-downsize-mizhuho-merger-zombies-tokyo-dispatch.html
The youth can’t get jobs because the positions are filled by entrenched creating this “unless you’re the cream of the crop you won’t get a decent job” permiating from school cumulating into your ranking at education all the way through to graduating in university where only the top cream get reasonable jobs, and many don’t. Even that doesn’t even start to scratch the surface since there’s the aging population, negative population growth requiring less “low skill jobs” like trades in construction…
My point is, I wouldn’t want to replicate that either.
Day9. Though I just rewatched a funday Monday from episode 200 or 300 and it was just as amazing and fun as it was back over a decade ago.
I watched newer stuff he still seems to be a great guy.
Sorry to clarify: updates come as security or as feature updates. If I’ve already got a standard operating environment (SOE) with all the features I/staff need to do work, I don’t need new features.
I then have to watch cves with my cve trackers to know when software updates are needed and all devices with those software get updated and the SOE is updated.
I can go on a rant about how bad the Linux has recently made my life as someone’s policy is that any Linux bug might be a security vulnerability and therefore I now have infinite noise in my cve feed, which in turn is making decisions on how to mitigate security issues hard, but that is beyond this discussion.
So in short I’m only talking about when you update, updating only security fixes, not the software and features. Live patching security vulnerabilities is pretty much free low effort, low impact, and in my personal opinion, absolutely critical. But software features patching can be disruptive, leaves little to be gained, and really only should be driven for a request to need that feature at which point it would also include an update to the SOE.
Inertia is just a sign of maturity. It’s fine. Nothing wrong with it. Especially when the new stuff is happening along side it. In 10 years there may be people asking why you’re using arch or nix, when whatever new thing is superior. But it’ll just be proof that nix can run in production for 10+ years.
Is that the one where you start with a stealth mission that never appears again in the game? It acts as a mandatory tutorial and makes the whole thing unreplayable because of its heavy handed enforcement? If I’m right, this game is a really good minor evolution of the original for exactly one play through. However I wanted to enjoy it a second time a few times but never got through the intro. Hmm exactly how I’d describe metal gear solid 5. I’ve got great memories just can’t revisit it.
Yeah I have constant crashes back to login screen but never have I seen a kernel panic except before a system boots. Mm a few exceptions
I checked too, it’s not a valid public DNS record, so then the question is, does Oktas internal DNS resolve this. Even if it does, how does okta even sit in this? Are they the identity provider for Twitter? Surely even if it’s identity, it’s got nothing to do with content moderation? So many questions.