• 4 Posts
  • 400 Comments
Joined 2 years ago
cake
Cake day: June 11th, 2023

help-circle




  • As someone in the software/networking space, I have a hard time with the author’s lack of attribution of the control/evasion characteristics of networks to people (developers of protocols, network operators, and users). Yeah, he admits the MPAA exists, but dude doesn’t mention Bram Cohen.

    Describing files as “artificial life” in

    Because peer-to-peer networks on which all files replicate are unpredictable complex systems, the files themselves can be seen as a form of nonorganic life. The reproduction of files can be described with a family tree in the same way that genetic family trees show the relationships between biological relatives.

    is tortured.

    Yeah, control/evasion is an arms race, but it isn’t meaningfully described as interactions within file sharing networks. It’s interactions between people, institutions, laws, legislators, courts, and software owned by different actors.


  • Generally speaking, no programmable networked device is guaranteed to be under your control.

    You can make strong arguments about certain types of hardware and software, but it is always possible that it contains a backdoor from the manufacturer, and it is almost guaranteed that it has multiple vulnerabilities that would give a remote attacker full control.

    Related

    Edit: Generally, I agree with the sentiment that things shouldn’t be this way, but that’s the world we live in. Given how we build software and hardware, we need to be able to update our devices to fix vulnerabilities. As long as that requirement exists, no device can be considered trustworthy.










  • Hanlon’s Razor is all well and good as a heuristic, but tends to lead to people discounting malice much too often.

    There’s definitely scenarios where that is the case.

    Also, I really didn’t say we were “under attack”

    I would describe a massive influx of spambots as an attack on a social media platform. It’s my characterization. I didn’t mean to imply that you said it.



  • Lemmy is a federated system and these stats are self-reported by user maintained systems. Rather than a sudden influx of users (bots or otherwise), a misconfigured system or hiccup in stats collection seems more likely.

    Generally, Hanlon’s Razor, add applied to computing: Never attribute to malice that which is adequately explained by stupidity user error.

    There’s a lot of malicious systems out there, but there is little corroborating evidence indicating that we’re under attack.