• 0 Posts
  • 137 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle






  • Tbf not that hard to increase waste by 25%. Just think of how a new staff takes a long time to do easy work, causes rework, and generally sucks up the time of the people around them until they get the experience and skills they need to do that job.

    That’s the micro scale, but in a macro scale it’s the same. Cause more waste, and not only will the money matter less, the public interest will be deteriorated and the entire foundation compromised.

    Actually just check out the history of CIA ops around in foreign countries. Consider how many of those countries end up with a high inflation rate and that currency becomes more worthless in a deathspiral.

    I think it’s not a single factor like “it’s orchestrated by state nation x” but I fully believe if the US is going to make itself weak then those countries like potentially Russia or China will take full advantage of it and offer a helping push. They’ll do it subtly. So it’s hard to see. But it’s just standard politics, and it would be insane to think they won’t take full advantage of a situation.





  • biscuitswalrus@aussie.zonetoProgrammer Humor@programming.devSafe passwords
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    edit-2
    1 month ago

    Enterprise applications are often developed by the most “quick, ship this feature” form of developers on the world. Unless the client is paying for the development a quick look at the sql table shows often unsalted passwords in a table.

    I’ve seen this in construction, medical, recruitment and other industries.

    Until cyber security requires code auditing for handling and maintaining PII as law, mostly its a “you’re fine until you get breached” approach. Even things like ACSC Australia cyber security centre, has limited guidelines. Practically worthless. At most they suggest having MFA for Web facing services. Most cyber security insurers have something but it’s also practically self reported. No proof. So if someone gets breached because someone left everyone’s passwords in a table, largely unguarded, the world becomes a worse place and the list of user names and passwords on haveibeenpwned grows.

    Edit: if a client pays and therefore has control to determine things like code auditing and security auditing etc as well as saml etc etc, then it’s something else. But say in the construction industry I’ve seen the same garbage tier software used at 12 different companies, warts and all. The developer is semi local to Australia ignoring the offshore developers…



  • Can’t agree more.

    I’ll add, from a organisational risk perspective, a government should ensure its not locked into reliance on corporations. There’s certainly an assumption especially in the government’s I work in, Microsoft 365 has no viable alternative. Yet that itself should be warning for the ACSC or signals directorate invest in open code such that if the provider aligns with a country you change positions on, you can fork your code, tender off its continued support to new maintainers, and continue on.

    Well, I know that ultimately nobody will get in trouble even if fears became reality. Everyone will put up their hands and say “we couldn’t see this coming and we had no alternative so there’s nothing that could have been done to prevent it.”. It’s just a disappointment that it becomes a missed opportunity for taxpayer investments to be invested, instead of lost to corporate fees straight overseas.








  • I’m far from an expert sorry, but my experience is so far so good (literally wizard configured in proxmox set and forget) even during a single disk lost. Performance for vm disks was great.

    I can’t see why regular file would be any different.

    I have 3 disks, one on each host, with ceph handling 2 copies (tolerant to 1 disk loss) distributed across them. That’s practically what I think you’re after.

    I’m not sure about seeing the file system while all the hosts are all offline, but if you’ve got any one system with a valid copy online you should be able to see. I do. But my emphasis is generally get the host back online.

    I’m not 100% sure what you’re trying to do but a mix of ceph as storage remote plus something like syncthing on a endpoint to send stuff to it might work? Syncthing might just work without ceph.

    I also run zfs on an 8 disk nas that’s my primary storage with shares for my docker to send stuff, and media server to get it off. That’s just truenas scale. That way it handles data similarly. Zfs is also very good, but until scale came out, it wasn’t really possible to have the “add a compute node to expand your storage pool” which is how I want my vm hosts. Zfs scale looks way harder than ceph.

    Not sure if any of that is helpful for your case but I recommend trying something if you’ve got spare hardware, and see how it goes on dummy data, then blow it away try something else. See how it acts when you take a machine offline. When you know what you want, do a final blow away and implement it with the way you learned to do it best.