this post was submitted on 04 Feb 2025
162 points (94.5% liked)

Technology

61632 readers
5207 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Bishma@discuss.tchncs.de 83 points 1 day ago (2 children)

So MAGA controlled software is all going to be full of security holes and none of their coders will really understand how it works (when it works). I'm sure this won't come up later as groups are looking for ways to take them down.

[–] IllNess@infosec.pub 35 points 1 day ago (1 children)

The security holes are feature. They can blame them on AI and still allow friends of Trumps to take all the info they need without Trump having to deliver it himself.

[–] Bishma@discuss.tchncs.de 16 points 1 day ago (1 children)

Others who will be able to take and control the data may include Iran, Belarus, Russia, North Korea, and any shlub with a a copy of Kali and decent understanding of cybersecurity.

[–] AbidanYre@lemmy.world 19 points 1 day ago

Belarus, Russia, North Korea

The guy you responded to already said friends of Trump.

[–] sunzu2@thebrainbin.org 8 points 1 day ago (1 children)

This is NOT about the code or product, this is about siphoning money from US taxpayers.

They don't care if it works, if we pay lol

[–] Bishma@discuss.tchncs.de 3 points 1 day ago

I care, in so much as I want to know what weakness I can exploit.