• 0 Posts
  • 74 Comments
Joined 2 months ago
cake
Cake day: August 2nd, 2025

help-circle


  • You’re looking at it from a business perspective which is valid but the resources available to the average person to prevent and / or mitigate a realm threat are virtually nonexistent.

    Up until now it’s made no sense to target Joe Schmoe or his neighbours what happens when a state sponsored threat actor decides to burn it all down, or someone decides to start targeting the average person rn Massé with malicious ai?

    It’s not a big deal on a case by case basis but almost no cybersecurity company will help out an individual unless they’re rich, the police are brain dead.






  • krunklom@lemmy.ziptoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    60
    arrow-down
    1
    ·
    15 days ago

    The laissez faire attitude most tech companies, non tech companies, and people, have towards cyber security is a ticking fucking time bomb.

    This isn’t 1990. Everything relies on technology. I can’t help but feel that we are headed towards a clusterfuck the likes of which has never been seen before.







  • With the caveat that I haven’t read how google is implementing this I can provide some high level context on how hashes work from a security perspective.

    Anyone else feel free to correct anything I get wrong here.

    So, once upon a time someone came up with something called md5 for encrypting things. This didn’t end up being a very effective way of encrypting files, but people did find that encrypting files this way was a great way to predictably create a value that would be unique to that specific file.

    So if you take an md5 hash of a .txt files with “goat testicles” in it, called goats.txt, and someone sends you a file called goats.txt, you should be able to take an md5 hash of the file before opening it, and if they match up they’re the same file. If someone adds a “z” to the end of goats.txt the md5 hash will change so you’ll know it’s not the same file.