• 3 Posts
  • 117 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle










  • Only if you don’t have the critical thinking to understand how information management is a significant problem and barrier to medical care.

    Being able to research and find material relevant to a patient’s problem is an arduous task that often is too high a barrier for doctors to invest in given their regular workloads.

    Which leads to a reduction in effective care.

    By providing a more efficient and effective way to dig up information that saves a ton of time and improves care.

    It’s still up to the doctor to evaluate that information, but now they’re not slogging away trying to find it.



  • douglasg14b@lemmy.worldtoSelfhosted@lemmy.worldJellyfin over the internet
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    3
    ·
    edit-2
    9 days ago

    These are all holes in the Swiss cheese model.

    Just because you and I cannot immediately consider ways of exploiting these vulnerabilities doesn’t mean they don’t exist or are not already in use (Including other endpoints of vulnerabilities not listed)


    This is one of the biggest mindset gaps that exist in technology, which tends to result in a whole internet filled with exploitable services and devices. Which are more often than not used as proxies for crime or traffic, and not directly exploited.

    Meaning that unless you have incredibly robust network traffic analysis, you won’t notice a thing.

    There are so many sonarr and similar instances out there with minor vulnerabilities being exploited in the wild because of the same"Well, what can someone do with these vulnerabilities anyways" mindset. Turns out all it takes is a common deployment misconfiguration in several seedbox providers to turn it into an RCE, which wouldn’t have been possible if the vulnerability was patched.

    Which is just holes in the swiss cheese model lining up. Something as simple as allowing an admin user access to their own password when they are logged in enables an entirely separate class of attacks. Excused because “If they’re already logged in, they know the password”. Well, not of there’s another vulnerability with authentication…

    See how that works?





  • And it won’t scale at all!

    Congratulations, you made more AI slop, and the problem is still unsolved 🤣

    Current AI solves 0% of difficult programming problems, 0%, it’s good at producing the lowest common denominator, protocols are sitting at 99th percentile here. You’re not going to be developing anything remotely close to a new, scale able, secure, federated protocol with it.

    Nevermind the interoperability, client libraries…etc Or the proofs and protocol documentation. Which exist before the actual code.