Oh absolutely. I work in information security, and I definitely have a good amount of “but that’s not how it works!” when I watch it.
But hey, it’s entertaining, and it’s not like other shows get it much better.
Oh absolutely. I work in information security, and I definitely have a good amount of “but that’s not how it works!” when I watch it.
But hey, it’s entertaining, and it’s not like other shows get it much better.
This is basically the plot of Leverage, and part of why it’s such a good show.
Can’t speak for the person you’re replying to, but I’m a security engineer and stuff still makes its way to me that you would think would get filtered out by others (and isn’t my job to fix). It just takes the right person thinking “this is obviously a problem with $system, let’s just send it straight over to them so they can fix it quickly!” And then we get the fun job of proving it’s not us and has no relation to us.
We got a ticket today for packet loss between two systems, neither of which have any of our tools on them…
While you’re not wrong about there being other constellations in the works, Starlink is the first to actually launch more than a (relative) few. Over 50% of satellites in orbit, total, belong to Starlink.
So while there are other projects planned or under construction, Starlink is the most visible by far, and that’s a lot of why we hear about it the most.
Also yeah, it’s owned by Elon Musk, so that alone guarantees it’ll stay in the news.
That’s great! Like I said, it’s dependent on your employment contract. But for people who aren’t as certain, separate work and personal devices as much as possible just to protect yourself.
Depending on where you work, your employer may be able to take that personal device you’re using for work in the event of a lawsuit against the company (where they need to retain anything that may be relevant to discovery), or in the event of a security incident (where they may need it for forensics).
I work in information security, and I practice strict isolation for that exact reason. Two laptops, two phones, because if anything ever happens they can and will take devices for analysis or evidence. If you are using an issued device, they’ll assign you a new one; if it’s a personal device you’ll get it back when they’re done with it, which could take years.
Edited to add this is dependent on your employment contract, but it’s better to be safe than sorry. Cover your camera and use your work computer.
I’m a security engineer, and encryption is great, but can be bypassed. Relying on encryption assumes it was implemented properly, that the system was shut down properly so all keys were flushed correctly, and the encryption algorithm doesn’t have weaknesses.
Generally if somebody dedicated enough can acquire physical access to a system, they can probably find a way into it given the right resources. Did that happen here? Probably not. Could it have? Absolutely. That’s why most enterprises or government hard drives are shredded rather than just relying on them being wiped or encrypted.
Encryption is part of the solution, but it’s not automatically the complete solution.
We don’t know what was on those servers, but it was apparently sensitive enough that the government redacted descriptions of the data in court filings.
The US government brief said the relocated servers were not wiped before being moved to a new data center. The type of data on the relocated servers was apparently so sensitive that it could not be described in the US court filing, which redacts the sentence that describes what the servers contained.
If a police aircraft gets shot down, they’re just going to arrest everyone they can find nearby and work it out from there.
That’s what they do when a police helicopter gets hit with a laser pointer, I would assume it would be the same in this case.
I know you’re being facetious, but for anyone thinking seriously about this, shooting down aircraft, which drones are categorized as, is a Federal offense. Same with shining a laser at it, trying to jam its communications, or spoofing GPS to throw off its navigation.
And if the cops are the ones operating the drone, they’ll probably be highly incentivized to arrest and prosecute you.
That’s also part of why a lot of large telescope mirrors get made in Tucson, at the University of Arizona!
I run those calls through my own phone system, which I host on a system in my basement. There are a couple main options out there, I used FreePBX for a while but now I’m using 3CX. They don’t require a ton of computing power-- mine runs on a virtual server inside a larger system, but you could run one off of an inexpensive thin client from eBay if you wanted to.
I get my phone number from VoIP.ms, which is pretty inexpensive and has worked well for me for years.
For a phone, you can either use a soft phone (an app on your computer or smartphone), or use an older IP phone off eBay (which is what I do since I also have a Plantronics wireless headset that connects to it).
It’s pretty easy to get started, but you do need to make sure you’re configuring everything correctly since selfhosted services can open up security holes in your network if you don’t know what you’re doing.
This is why I always record calls with major corporations when I’m talking about money. I’ve never had to actually resort to sending them recordings, but I have used the “Well, every call made from this phone is recorded, so I can go back and pull the recording of what I’ve been told if you don’t have it in your system” line a couple times.
Willow looks like it’s a decent chunk of the way there, as soon as the hardware is more generally available.
Depends on where you are.
I’m in the Midwestern United States now, where summer is often pretty frustrating due to the high humidity. But I’m originally from Phoenix, where I really enjoyed summer (in the shade), because I love the feeling of warmth soaking into my bones, and I never got sweaty.