• 0 Posts
  • 146 Comments
Joined 2 years ago
cake
Cake day: December 29th, 2023

help-circle

  • there are public STUN servers: just like DNS, STUN is a fairly critical part of modern infrastructure

    peer to peer real time video is a fairly solved problem. the fact that we have google/amazon/zoom/etc in the middle isn’t because it’s necessary

    that having been said, STUN servers are also incredibly cheap to run… i wouldn’t consider it exactly off the cards for a company that’s selling products to support a public STUN server indefinitely… it’s not quite as simple as them having to pay tens of thousands /mo in infrastructure costs to keep the lights on: it’s more like $100/mo, which at numbers that small you’d make back in just interest on the sales you made… but i reckon it could go something like “support for 10 years” and then they release an update that lets you set your own STUN server; perhaps defaulting to a public, free one




  • they’re not going to go after the robot vacuum when the thermostat, tablets, computers, TV, router, access point, etc are right there.

    … and all of those things should be equally protected

    they’re going to go for the easiest thing to extract information or escalate

    since they have root they can add a password themselves!

    the most absurd thing is assuming that an end-user is going do add a root password to a serial interface

    i’m not saying end users shouldn’t be able to gain root somehow, simply that it shouldn’t be wide open by default… there should be some process, perhaps involving a unique password per device



  • you’re on programming.dev so i assume you know that secrets is a generic term to cover things like your cloud account login (whatever form that may take - a password, token, api key, etc) for the robot vacuum service and you’re being intentionally obtuse

    it’s a realistic attack scenario for some people - think celebrities etc, who might be being targeted… if someone knows what type of vacuum you have, it’s not “carefully take apart” - it’d take 30s, and then you have local network access which is an escalation that can lead to significantly more surveillance like security cameras, and devices with unsecured local access

    just because it doesn’t apply to you doesn’t mean it doesn’t apply to anyone… unsecured or default password root access, even with physical access, is considered a security issue




  • but that’s a compromise… it’s not categorically better

    you can’t run a bank like you run distributed instances, for example

    services have different uptime requirements… this is perhaps the first time i’ve ever heard of signal having downtime, and the second time ever that i can remember there’s been a global AWS incident like this

    and not only that, but lemmy and every service you listed aren’t even close to the scale of their centralised counterparts. we just aren’t there with the knowledge for how to build these services to simply say that centralised services are always worse, less reliable, etc. twitter is the usual example of this. it seems really easy, and arguably you can build a microblogging service in about 30min, but to scale it to the size that it handles is incredibly difficult and involves a lot of computer science (not just software engineering)


  • that’s pretty disingenuous though… individual lemmy instances go down or have issues regularly… they’re different, but not necessarily worse in the case of stability… robustness of the system as a whole there’s perhaps an argument in favour of distributed, but the system as a whole isn’t a particularly helpful argument when you’re trying to access your specific account

    centralised services are just inherently more stable for the same type of workload because they tend to be less complex, less networking interconnectedness to cause issues, and you can focus a lot more energy building out automation and recovery than spending energy repeatedly building the same things… that energy is distributed, but again it’s still human effort: centralised systems are likely to be more stable because they’ve had significantly more work put into stability, detection, and recovery