• 114 Posts
  • 942 Comments
Joined 1 year ago
cake
Cake day: September 13th, 2024

help-circle





  • The Developer ID certificate is the digital signature macOS uses to verify legitimate software. The certificate that Logitech allowed to lapse was being used to secure inter-process communications, which resulted in the software not being able to start successfully, in some cases leading to an endless boot loop.

    This is 100% on Apple users for letting a company decide what their computer can and can’t run. And then brag about its security like it has some super special zero trust architecture and is not just a walled garden with a single point of failure dependent on opaque decision making criteria for what code should be “allowed” to run on the system.

    Key and signature based security model does not prove if it’s safe, it proves if it’s approved. They’re not the same.

    Macs don’t get malware. Unless it’s malware Apple approves, those are called apps.




  • HiddenLayer555@lemmy.mltoProgrammer Humor@lemmy.mlelectron.jxl
    link
    fedilink
    English
    arrow-up
    16
    ·
    edit-2
    5 days ago

    it was called CROSS PLATFORM APPS

    Absolutely not unless it’s as sandboxed as the web (which even the web isn’t sandboxed that well).

    Working with software has only made me not trust software (that’s not open source.)

    Why we’re giving any random software full user level access in 2026 is beyond me.









  • I’ve heard reasons for it like "women’s bathroom needs places to dispose of pads/tampons but, like, it’s a box on the wall. Put one in both.

    Also heard reasons along the lines of “men are faster at using the bathroom so why should we need to share with women” (even though with single bathrooms the washing your hands part is the time bottleneck, not the peeing part) or just general disgust at the idea of sharing a bathroom with the other gender (have heard it from both genders).


  • I think having a TPM enables a number of worthwhile security features.

    But most of those security features place the TPM at the root of trust, something that is SEVERELY undermined by the fact that it is not open source, meaning it is inherently untrustworthy.

    Is it not the one chip we should demand and accept nothing less than complete openness in its implementation and complete control by the person who owns the device? I also think the types of protections it grants in theory are very good, but the fact that it’s proprietary means it’s terrible at actually granting you those protections.