• 0 Posts
  • 78 Comments
Joined 2 years ago
cake
Cake day: July 9th, 2023

help-circle
  • I’m not entirely sure why all the hate : Jenkins can do the most things the must ways. And yes, it’s so much nicer defining a pipeline with a fully functional language than an assortment of yaml files

    Actually that was my response when my company wanted to start using Gitlab ci. It only has one way of doing things so you can probably get a faster start if you had no ci, were a small company, and had simple builds. However we’re over 4,000 builds in many languages from 12 year old monoliths to modern micro services and containers…… and way too much godawful JavaScript. Do you want the quick and simple tool great for a small startup or the all powerful kitchen sink of tools?



  • Signing (intermediate) certs have been compromised before. That means a bad actor can issue fake certs that are validated up to your root ca certs

    While you can invalidate that signing cert, without useful and ubiquitous revocation lists, there’s nothing you can do to propagate that.

    A compromised signing certs, effectively means invalidating the ca cert, to limit the damage





  • I always thought this was an argument for properly racking everything. If it takes more effort, more time to remove, maybe they won’t bother.

    My understanding is that for most individuals, theft is mainly

    1. Targets of opportunity. Lock your door and make sure nothing expensive is visible
    2. Smash and Grab. The goal is to act fast and not care about what you break, so anything harder to smash (without tools) or that causes delay is good.

    I do have outside cameras but they’re not as useful as you’d think. Maybe they have some deterrent value but they’re not going to alert anyone fast enough unless they’re already in the house and you’re not going to identify anyone even if you catch a good shot of their face. If the do catch someone, perhaps the video is enough to say, yep




  • AA5B@lemmy.worldtolinuxmemes@lemmy.worldbad news ipv4 fans
    link
    fedilink
    arrow-up
    21
    arrow-down
    1
    ·
    4 months ago

    Something needed to happen here, we’ll see if even Torvalds has the power to kick massive telecom and consumer electronics conglomerates in the butt. It’s been too long.

    • My fiber provider started an early rollout of IPv6 like a decade abgo, and it’s been stalled out ever since.
    • I’m still seeing new consumer electronics being sold even though they’re IPv4 only.


  • Yeah, jira is too customizable. I mean I wouldn’t give any of it up, but the one time someone let me have the reins, I mostly simplified. Removed workflows, removed customizations.

    There needs to be better ways of defining standard projects and sticking to them. Currently everyone wants their little tweak and you can’t even pick out what’s consistent and what’s not until you run into problems



  • My company only allows downloads from official sources, verified publishers, signed where we can. This is enforced by only allowing the repo server to download stuff and only from places we’ve configured. In general those go through a process to reduce the chances of problems and mitigate them quickly.

    We also feed everything through a scanner to flag known vulnerabilities, unacceptable licenses

    If it’s fully packaged installable software, we have security guys that take a look at I have no idea what they do and whether it’s an audit

    I’m actually going round in circles with this one developer. He needs an open source package and we already cache it on the repo server in several form factors, from reputable sources …… but he wants to run a random GitHub component which downloads an unsigned tar file from an untrusted source