• Ogmios@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    edit-2
    2 months ago

    And then once you start to understand the ways that ideas are corrupted by hacks, you can start to see the same sort of behaviour even when it has an official stamp of approval from an ostensibly legitimate organization. Take the ‘cybersecurity’ grift, for example, in which technical wizards pretend that they can definitively secure your vital computer systems, even with an always-on Internet connection, if you give them enough money.

    • fishpen0@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      With a magic one size fits all solution that happens to also be a rootkit that by default rewrites itself on automatic updates.

      If you’re still with me please read about EBPF and why it can be used to do EDR style monitoring without a rootkit on any modern flavor of Linux. It can also be used to replace your monitoring and observability stack shims in your product. It was built by kernel developers and is already baked into your OS.