this post was submitted on 05 Mar 2024
86 points (93.0% liked)

Enough Musk Spam

2204 readers
122 users here now

For those that have had enough of the Elon Musk worship online.

No flaming, baiting, etc. This community is intended for those opposed to the influx of Elon Musk-related advertising online. Coming here to defend Musk or his companies will not get you banned, but it likely will result in downvotes. Please use the reporting feature if you see a rule violation.

Opinions from all sides of the political spectrum are welcome here. However, we kindly ask that off-topic political discussion be kept to a minimum, so as to focus on the goal of this sub. This community is minimally moderated, so discussion and the power of upvotes/downvotes are allowed, provided lemmy.world rules are not broken.

Post links to instances of obvious Elon Musk fanboy brigading in default subreddits, lemmy/kbin communities/instances, astroturfing from Tesla/SpaceX/etc., or any articles critical of Musk, his ideas, unrealistic promises and timelines, or the working conditions at his companies.

Tesla-specific discussion can be posted here as well as our sister community /c/RealTesla.

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 8 months ago (2 children)

There are legitimate military-grade designations. Military-grade encryption is one. It entails a mandatory physical component. Quite expensive without even considering the logistics behind securing such a device. Not cheap by any means, and yet it really bothers me that you can buy "military-grade" encryption without the hardware for consumer products. That's.....just regular encryption guys...

For stuff that legitimately has such designations on the consumer side, it's not just cheap - it's incorrect, incompatible, or illegal.

[–] [email protected] 2 points 8 months ago (2 children)

What specifically gives the physical component better encryption than a pure software solution? It's just a stream of data, anything hardware can do to it can also be done by software. Purpose-built hardware is generally faster than general-purpose hardware, but if you don't mind the speed difference, the encrypted data should be just as secure whether a physical component was involved or its role was played by software.

At least that's how I understand it.

[–] [email protected] 2 points 8 months ago

I believe they are talking about systems that require the input of a ... haha 'closed source' (meaning classified) physical hardware/software system that is completely non networked that requires a human being to be physically using /at least/ one entirely, totally sandboxxed device to complete the authentication process of accessing information on a networked device.

Kind of like an extremely more advanced version of the enigma machine + codebook system.

I may be wrong here though about specifically what they are referring to, I don't actually have any actual experience with real milgrade cybersecurity stuff.

The sort of cheapo way to do something like this is something I've seen at various points in my tech industry career, basically a yubikey or similar devices.

[–] [email protected] 2 points 8 months ago

From a birdeye view, nothing. And that's not what the designation attempts to address. It's not even about how fast the hardware is, as encryption doesn't require lots of processing power and key delivery systems are relatively simple devices.

It's about control. Encryption in general is robust and nobody directly tries to break the algorithm. Most breaches are done by bypassing the encryption entirely. By adding a hardware component, it makes it very difficult to do so. It also creates a one-way bridge for key delivery - once you put keys into the device you cannot remove it. The only option is to delete it. Most of the devices are also hardened - they emit no signals, resist interference, and have various preventions that will dump keys and software in the event the device is tampered with. Add to the fact that because it's physical in nature and not some boogeyman subsystem buried deep in a server, you can point to it, tell someone to guard it, and put it in a vault. Most also have an accessible wipe button, which makes it easy to prioritize what gets destroyed if the need calls for it. There are many more things, but I think I made my point.

It's still hard for the consumer market to have a physical component for encryption. Even for those that do, it's still not robust enough. You can get legitimate military-grade encryption, with all its bells and whistles, but it's incredibly expensive and requires specific requirements by the NSA. But afaik, there is no cheap alternative, and most of what you see being advertised is just marketing gibberish.

[–] [email protected] 1 points 8 months ago

Perhaps another example somewhat along these lines would be 'military grade' laptops.

No, not (usually) the stuff marketed as milgrade, actual military grade laptops that are nearly bullet proof suitcases that can survive a bomb going off near them or being dropped out of a moving vehicle.

They also have other comms capabilities and such, but I think the main point here is ... heres a thing thats /actually/ physically durable and tough, faaaar more so than basically any consumer grade laptop.

Is this a practical level of protection needed by most consumers? Probably not. But, it might be handy in an apocalypse scenario.