Remix.run Logo
cncrndnetizen 3 days ago

Yet another sign that governments and corporations should support SECURE programming language development and treat it like other (critical) infrastructure.

tetha 2 days ago | parent | next [-]

I'd rather say we need more cyber anarchy and chaos within Europe. We need security researchers and the CCC and similar organizations with an absolute freedom to hack everything in Europe.

Get into everything, break every security control in Europe, be a pain. As long as function is not impacted, and security problems are reported responsibly. Don't DoS a power plant because you think you can, and face a judge if you do.

That's what foreign powers are doing and slowly collecting as preparation for the future, and that's the only real way to increase cyber security across the board.

dmix 2 days ago | parent [-]

You'll have to pay for that if you're going to have people as motivated as the adversaries.

marginalia_nu 2 days ago | parent | prev | next [-]

Most of the Swedish public sector runs on Java. Problem is it's, like public infrastructure in general, more attractive to build than to maintain.

Doesn't matter what language you use if you don't actually maintain the software.

pksebben 2 days ago | parent [-]

It matters at least a little. Ceteris parabus, I'd prefer unmaintained rust code over unmaintained java.

That said, I'd also prefer maintained java over unmaintained rust, so I do see your point.

victorbjorklund 2 days ago | parent | prev | next [-]

We don’t know what happened but rumor is it was a file that was uploaded for an integration and that the server wasn’t secured. Same would have happened no matter if using Rust or any other language.

alistairSH 2 days ago | parent | prev | next [-]

Is there any indication this breach was related to the language used? Or was it something "higher level" like unsecured DB or S3 bucket or similar?

shakna 2 days ago | parent | prev | next [-]

In the past, Datacarry has almost exclusively used phishing as their first penetration of systems. (Exploits follow for escalation, but not generally penetration.)

Whilst we don't know exactly what they did here, a secure programming language will do bupkus when you're targeting the meatbag behind the keyboard. We need to treat people like infrastructure, that can and will eventually fail.

LtWorf 2 days ago | parent | prev | next [-]

Was the leak due to a stack overflow, double free or similar issue?

hulitu 12 hours ago | parent [-]

It was an outsourcing overflow. /s

november123 2 days ago | parent | prev | next [-]

Statistically PII leaks are due to not secure business logic bugs. Not because of unsafe memory handling of a programming language.

Unauthorized API always leaks.

vbezhenar 2 days ago | parent | prev [-]

PHP was developed 30 years ago.