this post was submitted on 30 Jan 2024
837 points (98.2% liked)

Technology

59235 readers
3184 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] maness300@lemmy.world 10 points 9 months ago (1 children)

What exactly is the issue? Everything mentioned is true.

It even goes further when you consider how newer technology often incorporates more technology, which means a greater attack surface.

Tell me you know nothing about cybersecurity without telling me you know nothing about cybersecurity.

Oh, the ironing. Sad how you have >100 upvotes.

[–] voodooattack@lemmy.world -5 points 9 months ago* (last edited 9 months ago)

Not sure how to link a reply on lemmy so I’ll just copy from another comment I wrote here:

I’m not talking about this specific instance, just that block of misinformation/generalisation. Saying that legacy systems are well-secured because they’re “battle tested” is sheer ignorance.

Take side-channel attacks for example. A timing attack is something programmers from the 60’s and 70’s would not have taken into account when writing their hashing algorithms. And speaking of hashing, what hashing algorithms were available back then? CRC32 or something similar? What about salting? You get the idea.

Not to mention that legacy operating systems don’t get security updates. Let’s assume that DOS is secure (which it definitely isn’t), but if that statement were correct, would it apply to Windows XP as well?

All I’m saying is that the article is dead wrong. As software developers in this century, we’ve come a long way. We’ve developed security best practices, written libraries and frameworks, and come up with mitigations for a lot of these security vulnerabilities. These solutions are something that closed-source legacy systems (and anything without active maintenance) would never benefit from.

The “ironing” is lost on you in this case.