Just your normal everyday casual software dev. Nothing to see here.

People can share differing opinions without immediately being on the reverse side. Avoid looking at things as black and white. You can like both waffles and pancakes, just like you can hate both waffles and pancakes.

  • 0 Posts
  • 1.88K Comments
Joined 2 years ago
cake
Cake day: August 15th, 2023

help-circle

  • Yeah, I was gonna say I dual boot and I can’t recall the last time that Windows nuked my UEFI bootloader.

    But back when Windows still did BIOS boot, it was like every major release without fail.

    edit: Rewreading your post it sounds like you meant updating the BIOS as a whole and not BIOS boot, so that’s my bad. Yeah, I definitely haven’t seen your circumstance, I had that happen consistently before Microsoft embraced the UEFI style booting





  • while docker does have a non-root installer, the default installer for docker is docker as root, containers as non-root, but since in order to manage docker as a whole it would need access to the socket, if docker has root the container by extension has root.

    Even so, if docker was installed in a root-less environment then a compromised manager container would still compromise everything on that docker system, as a core requirement for these types of containers are access to the docker socket which still isn’t great but is still better than full root access.

    To answer the question: No it doesn’t require it to function, but the default configuration is root, and even in rootless environment a compromise of the management container that is meant to control other containers will result in full compromise of the docker environment.



  • man, arcane looks amazing, I ended up deciding off it though as their pull requests look like they use copilot for a lot of code for new features. Not that I personally have an issue with this but, I’ve seen enough issues where copilot or various AI agents add security vulnerabilities by mistake and they aren’t caught, so I would rather stray away from those types of projects at least until that issue becomes less common/frequent.

    For something as detrimental as a management console to a program that runs as root on most systems, and would provide access to potentially high secure locations, I would not want such a program having security vulnerabilities.







  • yea you have it yes, if they have confirmation that you had said evidence, and they were seizing the device to collect more evidence regarding it then it would be obstruction of justice and destroying evidence, but they need to be able to prove that claim. Unless they can prove that claim then it’s an unlawful search (excluding port authority specific laws regarding searches because checkpoints generally have reduced restrictions on lawful searches)



  • The exact circumstances around the search—such as why CBP wanted to search the phone in the first place—are not known

    until this isn’t an unknown it’s impossible to voice opinion on the legality of this action. If they had evidence that there was something incriminating or against the law on the device and can prove the user intentionally destroyed the info to impede the investigation(honestly this last part is fairly easy as long as the first part can happen) then yea what he did would defo break the law, but until those aspects can be determined this seems like a massive abuse of that persons 1st(due to activism), 4th (due to the seizure of private property without a lawful search), and 5th(again private property) amendment rights.





  • in the case of constitutional amendments, this gets even more complex. Technically states have the ability to force a constitutional convention hearing in the case of a legislative branch either not bringing to the floor or denying an amendment that has clear popularity in the states.

    The issue with this is that it requires a 2/3 vote of the states in agreement, and that it also requires a system that only has the bare minimums defined legally on it. It doesn’t define what a convention is, or even how many people in the state have to agree. It’s fully left on the states to decide it on an individual basis how that system would work for them.

    How it would work is

    1. current legislative refuses to hear a popular amendment
    2. at least 2/3 of the states organize some sort of system that can act as a commitee somehow representing the overall choice of the states citizens
    3. upon 2/3 of the states agreeing, a convention is forced potentially excluding the legislative branch as a whole
    4. the bill that gets created at said convention is then put up to the 3/4 state vote required to ratify it.