• 0 Posts
  • 108 Comments
Joined 2 months ago
cake
Cake day: July 22nd, 2024

help-circle
  • By tracking who sent what to whom?

    If you know the phone number of a Hisbollah member and they send messages to a set of pagers, these are likely Hisbollah pagers. If you do that to several phone numbers, you get a pretty comprehensive list of members. You don’t need to know, where exactly they are. That’s simply not relevant.

    And again: if it’s a supply chain attack, you don’t even need these contacts. Just a single entry point into the supply chain of the organization.

















  • And there are some truly magic tools.

    XSDs are far from perfect, but waaay more powerful than json schema.

    XSLT has its problems, but completely transforming a document to a completely different structure with just a bit of text is awesome. I had to rewrite a relatively simple XSLT in Java and it was something like 10 times more lines.



  • The long-term goal is for Rust to overtake C in the kernel (from what I understand

    Your understanding wrong. Rust is limited to some very specific niches within the kernel and will likely not spread out anytime soon.

    critical code gets left untouched (a lot of the time) because no one wants to be the one that breaks shit

    The entire kernel is “critical”. The entire kernel runs - kind of by definition - in kernel space. Every bug there has the potential for privilege escalation or faults - theoretically even hardware damage. So following your advice, nobody should every touch the kernel at all.