this post was submitted on 06 May 2026
767 points (98.5% liked)

Technology

84569 readers
3904 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] JackbyDev@programming.dev 22 points 6 days ago (3 children)

This is sort of like saying "I leave my valuables in plain sight by my door because it has a lock on it and door locks are trustworthy." I'm not super into cyber security and stuff but it seems like one of the most common problems is programs managing to get access to memory they shouldn't have access to. It seems to happen all the time! Just like many locks for you door are trash.

[–] quack@lemmy.zip 5 points 5 days ago

Defense in depth is a concept they teach you in cybersecurity 101. But that's expensive and time consuming, so you end up with shit like this.

[–] partofthevoice@lemmy.zip 2 points 5 days ago* (last edited 5 days ago)

It’s ridiculous. It presupposes that cybersecurity doesn’t value or employ defense in depth. Completely untrue.

Look at the attack vector researchers were trying to solve when they created OAuth2.0 w/ PKCE.