ES version is available. Content is displayed in original English for accuracy.
Advertisement
Advertisement
⚡ Community Insights
Discussion Sentiment
100% Positive
Analyzed from 344 words in the discussion.
Trending Topics
#https#reading#assumption#put#corporate#http#ssl#page#public#knowledge

Discussion (10 Comments)Read Original on HackerNews
Before browsers screamed bloody murder over http, a MITM could defeat SSL by acting as the SSL endpoint and forwarding everything as plain http. And back then, the only indication was lack of a 16px lock icon and a missing "s" in "https".
It's additionally daft to think that just because the page is public knowledge, a specific person reading the page is never sensitive information. As a blunt example, Wikipedia is obviously public knowledge. If you are a Chinese national reading https://en.wikipedia.org/wiki/1989_Tiananmen_Square_protests... then the CCP might like to know your location.
"Regarding my new enemy, ...
• The absolute shits that have locked down corporate computers with the assumption that the user can’t have a legitimate reason to change settings on it, put in a USB stick, use the command line, run an “untrusted” application like emacs or something that I just wrote and compiled myself, or basically any application other than a web browser, even if that user has been programming for 40 years and has a Ph.D. in computer science and was hired for that very experience."
The result of being given this kind of corporate laptops is that I have never done any kind of work on them, but I have kept them open on my desk just for reading my e-mail messages in Exchange, or for using Teams and the like, while doing all the work that I had to do on my own device, over which I had the control needed for productive work.