Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "espionage"
-
Not so much screaming as staring in disbelief, mumbling profanity in his direction...
When my department lead said "I don't think this unit testing hype or code reviews make much sense, it's more efficient to just make a checklist and test the application yourself"
This was the QA department of an aerospace company, we wrote NDT software to do image recognition on xrays of alloy welds and micrometer laser measurements on fuel tank surfaces. Software which is quite mission critical, a single misrecognized welding fault could literally cost up to half a billion dollars — not to mention that it's a very sabotage & espionage sensitive industry.
After raising some hell he was replaced though.3 -
WikiLeaks founder Julian Assange has been charged with 17 new counts under the Espionage Act for "unlawfully obtaining" and disclosing national defense information.
Massive attack on media freedom and free speech.7 -
Hello guys and girls!
My company tasked me to do something insane.
Little background info: I'm a trainee, in my first year (of three, even though I will shorten my apprenticeship to two years). I told my trainer that I like encryption in a somewhat private talk.
Now to the insane part. I got tasked to develop a whole security concept ~2 weeks ago to protect our products against industrial espionage. I feel in no way competent enough to achieve this especially because my concepts so far have been dismissed with a 'naaaah. Can't we just do X for now and add the other stuff later?' or 'we can't do that.'
I seriously don't want my name under a concept we would use world wide on our customers pcs which I know has serious flaws.
What should I do? What would you do?22 -
Why is it so hard to just build machines that work without all this ideological bullshit? Code doesn't care if politics==true. The world is scary enough without you assholes making modern life a data minefield for even the most educated experts, and taking advantage of the ignorance of everyone else. Fuck you.
I just wanna <look at web pages> without having to consider, counteract, or silently assist some fucking regime. Why is EVERYTHING this way? Everything is a back door or a data mine or a political statement? This isn't a fucking art piece! It's not your espionage tool, fucking codes in invisible ink and tiny cameras and shit everywhere! It's a <web browser>, and if it does ANYTHING besides <browse the web> that I didn't explicitly tell it to do, you better better not be the one who made it. Because if you did, you are what's wrong with the world.6 -
I just found a vulnerability in my companies software.
Anyone who can edit a specific config file could implant some SQL there, which would later be executed by another (unknowing) user from within the software.
The software in question is B2B and has a server-client model, but with the client directly connecting to the database for most operations - but what you can do should be regulated by the software. With this cute little exploit I managed to drop a table from my test environment - or worse: I could manipulate data, so when you realize it it's too late to simply restore a DB backup because there might have been small changes for who knows how long. If someone was to use this maliciously the damages could be easily several million Euros for some of our customers (think about a few hundred thousand orders per day being deleted/changed).
It could also potentially be used for data exfiltration by changing protection flags, though if we're talking industry espionage they would probably find other ways and exploit the OS or DB directly, given that this attack requires specific knowledge of the software. Also we don't promise to safely store your crabby patty recipe (or other super secret secrets).
The good thing is that an attack would only possible for someone with both write access to that file and insider knowledge (though that can be gained by user of the software fairly easily with some knowledge of SQL).
Well, so much for logging off early on Friday.5 -
In the spirit of week93:
If you haven’t read/heard about the attack on HB Gary Federal (a computer security company) in 2011 and you want a good read about a DDOS attack, social engineering, espionage, and the “infiltration of Anonymous” by a very punchable CEO you should check out this article:
https://arstechnica.com/tech-policy...
And the follow up by Anonymous:
https://arstechnica.com/tech-policy...1 -
Interesting past of American + Germany worldwide espionage through a company in Switzerland.
https://washingtonpost.com/graphics... -
I installed a linux distribution it's called Zorin, i installed the latest one (Zorin Core 17) for a client since Windows 7 was giving him a headache, it was a very old machine with 4GB RAM with a celeron cpu if i remember, i suggest i will install linux and you won't have more issues with wifi and the printer he said okay, I installed everything, printer was recognized immediately Libre office was installed wifi is connected, security updates are done
After 2 days, he sent me a voice message telling me hey what is this zorin? Zorin everywhere, it's like if I'm using someone else program,I have nothing to do with the espionage things, I want windows back, i was crying he made me laugh for a week, i enjoyed listening to his voice messages on WhatsApp, whenever i get upset i listen to him and get excited hahahahhaha espionage? Do you think he let it go? Every 2 days i receive a voice message complaining about Zorin and how i was spying on him hahaha I explained over and over how secure linux is and how Microsoft knows everything he does on his machine, after giving me a headache i sent a friend and he installed ms 7 back and i never heard of him again11 -
I live in an unstable region, so I'm always ready for surprise curfews or my aunt dropping by uninvited to borrow some cooking oil. To protect my future from both, I swept $530,000 under the floor in Bitcoin- my emergency parachute.
Well, things went downhill. Protesters filled the streets like a rowdy rave, with pepper spray in place of glow sticks. In the chaos, security personnel took my laptop and everything that wasn't bolted down. That's where I store the keys to my Bitcoin wallet. When I say I swallowed a brick, I am not kidding.
I pictured myself telling my future self, who lived under a tarp, how I used to have half a million dollars but lost it since I had forgotten to encrypt my drive. "Great job, Past Me," I would be saying while heating canned beans over a candle.
But fate, or possibly my guardian angel who was finally done laughing at me, intervened. During a hushed meeting with a journalist friend (we whispered like we were plotting an espionage thriller), he mentioned Tech Cyber Force Recovery. These folks were not just tech geniuses; they practically wore digital capes.
I phoned, and the reassuring voice I received was so reassuring, I almost asked them to fix my love life too. They labored in their homes with the frenzy of an explosives specialist defusing a bomb. They constructed my wallet information from recovery fragments I barely remember creating. It was like magic shows where magicians extract bills from a hat, except the hat has been confiscated by the authorities.
Thirteen days passed, and I received the call. My money had been returned. I was so relieved that I hugged my aunt, who naturally took the chance to request additional cooking oil.
Tech Cyber Force Recovery did not just save my Bitcoin; they saved my future. And they gave me a newfound respect for proper backups and encryption. If you are in a tricky spot or just want to avoid awkward family requests during every political crisis, call them. They are the real deal and possibly part wizard, part therapist.
CALL OR WHATSAPP THEM THOUGH
+.1.5.6.1.7.2.6.3.6.9.71
