Lemmy Today
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
phiresky@lemmy.world to Programmer Humor@lemmy.ml · 2 years ago

Hacking in 1980 vs Hacking in 2024

lemmy.world

message-square
116
link
fedilink
1.53K

Hacking in 1980 vs Hacking in 2024

lemmy.world

phiresky@lemmy.world to Programmer Humor@lemmy.ml · 2 years ago
message-square
116
link
fedilink
  • residentmarchant@lemmy.world
    link
    fedilink
    English
    arrow-up
    230
    arrow-down
    1
    ·
    2 years ago

    There’s no way the model has access to that information, though.

    Google’s important product must have proper scoped secret management, not just environment variables or similar.

    • nomecks@lemmy.world
      link
      fedilink
      arrow-up
      114
      arrow-down
      1
      ·
      2 years ago

      There’s no root login. It’s all containers.

      • SpaceNoodle@lemmy.world
        link
        fedilink
        arrow-up
        53
        arrow-down
        1
        ·
        2 years ago

        It’s containers all the way down!

        • RealFknNito@lemmy.world
          link
          fedilink
          English
          arrow-up
          32
          ·
          2 years ago

          All the way down.

          • magic_lobster_party@kbin.social
            link
            fedilink
            arrow-up
            15
            arrow-down
            1
            ·
            2 years ago

            I deploy my docker containers in .mkv files.

            • RealFknNito@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              2 years ago

              deleted by creator

      • residentmarchant@lemmy.world
        link
        fedilink
        English
        arrow-up
        13
        arrow-down
        1
        ·
        2 years ago

        The containers still run an OS, have proprietary application code on them, and have memory that probably contains other user’s data in it. Not saying it’s likely, but containers don’t really fix much in the way of gaining privileged access to steal information.

        • towerful@programming.dev
          link
          fedilink
          arrow-up
          19
          ·
          2 years ago

          That’s why it’s containers… in containers

          It’s like wearing 2 helmets. If 1 helmet is good, imagine the protection of 2 helmets!

          • PochoHipster@lemmy.ml
            link
            fedilink
            arrow-up
            9
            ·
            2 years ago

            So is running it on actual hardware basically rawdoggin?

            • 𝒍𝒆𝒎𝒂𝒏𝒏@lemmy.one
              link
              fedilink
              arrow-up
              6
              ·
              2 years ago

              Wow what an analogy lol

          • bobs_monkey@lemm.ee
            link
            fedilink
            arrow-up
            6
            ·
            2 years ago

            What if those helmets are watermelon helmets

            • Dyskolos@lemmy.zip
              link
              fedilink
              arrow-up
              2
              ·
              2 years ago

              Then two would still be better than one 😉

        • dan@upvote.au
          link
          fedilink
          arrow-up
          6
          arrow-down
          1
          ·
          2 years ago

          The OS in a container is usually pretty barebones though. Great containers usually use distroless base images. https://github.com/GoogleContainerTools/distroless

          • Cysioland@lemmygrad.ml
            link
            fedilink
            arrow-up
            3
            ·
            2 years ago

            Ah, so there is something even more barebones than Alpine

            • FrederikNJS@lemm.ee
              link
              fedilink
              arrow-up
              2
              ·
              edit-2
              2 years ago

              Sure, there’s also the scratch image, which is entirely empty… So if your app is just a single statically linked binary, your entire container contents can be a single binary.

              The busybox image is also more barebones than alpine, but still has a couple of basic tools.

      • Venat0r@lemmy.world
        link
        fedilink
        arrow-up
        12
        arrow-down
        3
        ·
        2 years ago

        The containers will have a root login, but the ssh port won’t be open.

        • UNWILLING_PARTICIPANT@sh.itjust.works
          link
          fedilink
          arrow-up
          4
          ·
          2 years ago

          I doubt they even have a root user. Just whatever system packagea are required baked into the image

        • FrederikNJS@lemm.ee
          link
          fedilink
          arrow-up
          3
          ·
          2 years ago

          Containers can be entirely without anything. Some containers only contain the binary that gets executed. But many containers do contain pretty much a full distribution, but I have yet to see a container with a password hash in its /etc/shadow file…

          So while the container has a root account, it doesn’t have any login at all, no password, no ssh key, nothing.

    • SpaceNoodle@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      2 years ago

      It does if they uploaded it to github

      • residentmarchant@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        1
        ·
        2 years ago

        In that case, it’ll steal someone else’s secrets!

    • nothacking@discuss.tchncs.de
      link
      fedilink
      arrow-up
      4
      ·
      2 years ago

      Still, things like content moderation and data analysis, this could totally be a problem.

    • Ziglin (it/they)@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      2 years ago

      But you could get it to convince the admin to give you the password, without you having to do anything yourself.

Programmer Humor@lemmy.ml

programmerhumor@lemmy.ml

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !programmerhumor@lemmy.ml

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

  • Posts must be relevant to programming, programmers, or computer science.
  • No NSFW content.
  • Jokes must be in good taste. No hate speech, bigotry, etc.
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 457 users / day
  • 1.73K users / week
  • 2.39K users / month
  • 10.4K users / 6 months
  • 142 local subscribers
  • 35.6K subscribers
  • 1.73K Posts
  • 38.1K Comments
  • Modlog
  • mods:
  • AgreeableLandscape@lemmy.ml
  • cat_programmer@lemmy.ml
  • BE: 0.19.11
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org