←back to thread

492 points vladyslavfox | 1 comments | | HN request time: 1.147s | source
Show context
badlibrarian ◴[] No.41896054[source]
Restating my love for Internet Archive and my plea to put a grownup in charge of the thing.

Washington Post: The organization has “industry standard” security systems, Kahle said, but he added that, until this year, the group had largely stayed out of the crosshairs of cybercriminals. Kahle said he’d opted not to prioritize additional investments in cybersecurity out of the Internet Archive’s limited budget of around $20 million to $30 million a year.

https://archive.ph/XzmN2

replies(3): >>41896114 #>>41897651 #>>41900416 #
semicolon_storm ◴[] No.41896114[source]
In security, industry standard seems to be about the same as military grade: the cheapest possible option that still checks all the boxes for SOC.
replies(4): >>41896673 #>>41896703 #>>41897579 #>>41897601 #
Spivak ◴[] No.41896703[source]
Hot take, this is the way it should be. If you want better security then you update the requirements to get your certification.

Security by its very nature has a problem of knowing when to stop. There's always better security for an ever increasing amount of money and companies don't sign off on budgets of infinity dollars and projects of indefinite length. If you want security at all you have bound the cost and have well-defined stopping points.

And since 5 security experts in a room will have 10 different opinions on what those stopping points should be— what constitutes "good-enough" they only become meaningful when there's industry wide agreement on them.

replies(4): >>41896781 #>>41896855 #>>41896959 #>>41897873 #
gjsman-1000 ◴[] No.41896855[source]
This ^

We can’t all have the latest EPYC processors with the latest bug fixes using Secure Enclaves and homomorphic encryption for processing user data while using remote attestation of code running within multiple layers of virtualization. With, of course, that code also being written in Rust, running on a certified microkernel, and only updatable when at least 4 of 6 programmers, 1 from each continent, unite their signing keys stored on HSMs to sign the next release. All of that code is open source, by the way, and has a ratio of 10 auditors per programmer with 100% code coverage and 0 external dependencies.

Then watch as a kid fakes a subpoena using a hacked police account and your lawyers, who receive dozens every day, fall for it.

replies(1): >>41897432 #
gjsman-1000[dead post] ◴[] No.41897432[source]
[flagged]
1. evilduck ◴[] No.41897675[source]
No, it’s your demeanor that is unbecoming and not worth engaging with. Villianizing your poor behavior not successfully baiting people into replying as you want is childish too. Take a breather.