• 2 Posts
  • 29 Comments
Joined 1 year ago
cake
Cake day: June 22nd, 2023

help-circle




  • I’m honestly curious. Have you ever heard of a single Palestinian accusing Hamas of using someone they know as a human shield? Has anyone ever, really?

    The only “sources” backing these “well-known facts” are western media and Israeli-say-so. I’ve dealt with many Palestinians personally (I live in Egypt and we have a lot of them living here), and none of them ever complained about their families being used as human shields. Ever. You’d think some Palestinians would speak up about this by now if it were real.

    You know who they unanimously consider unnecessarily brutal and cruel though? The IDF which treats them like less than dirt on a good day.

















  • Not sure how to link a reply on lemmy so I’ll just copy from another comment I wrote here:

    I’m not talking about this specific instance, just that block of misinformation/generalisation. Saying that legacy systems are well-secured because they’re “battle tested” is sheer ignorance.

    Take side-channel attacks for example. A timing attack is something programmers from the 60’s and 70’s would not have taken into account when writing their hashing algorithms. And speaking of hashing, what hashing algorithms were available back then? CRC32 or something similar? What about salting? You get the idea.

    Not to mention that legacy operating systems don’t get security updates. Let’s assume that DOS is secure (which it definitely isn’t), but if that statement were correct, would it apply to Windows XP as well?

    All I’m saying is that the article is dead wrong. As software developers in this century, we’ve come a long way. We’ve developed security best practices, written libraries and frameworks, and come up with mitigations for a lot of these security vulnerabilities. These solutions are something that closed-source legacy systems (and anything without active maintenance) would never benefit from.

    The “ironing” is lost on you in this case.