Discussion
Loading...

Post

  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
sjvn
@sjvn@mastodon.social  ·  activity timestamp last week

Top-of-the-line security: 1990s. Things have changed a bit since then.

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this post
  • Block
Alison Pitt :blobcatcoffee:
@adastra1930@mastodon.social replied  ·  activity timestamp last week

@sjvn is this a low-key bit/byte joke?

  • Copy link
  • Flag this comment
  • Block
mhoye
@mhoye@mastodon.social replied  ·  activity timestamp last week

@sjvn less, regrettably, than you would think.

  • Copy link
  • Flag this comment
  • Block
lemgandi
@lemgandi@mastodon.social replied  ·  activity timestamp last week

@sjvn That's about a 1-minute job with my lockpicks.

  • Copy link
  • Flag this comment
  • Block
stony kark
@aapis@mastodon.world replied  ·  activity timestamp last week

@sjvn @Lazarou I asked my dad about his highly secure disk bin once. He said those were all the games he hadn't installed yet. He liiiiied it was just spreadsheets ☹️

  • Copy link
  • Flag this comment
  • Block
Ben Foote
@benpocalypse@mastodon.social replied  ·  activity timestamp last week

@sjvn When I lived in a city, I replaced our front door deadbolt lock and when I told my mom that I'd replaced it her reply was:
"You made sure to get a good quality lock."
And I told her:
"The biggest security hole in your house is your windows. If anyone wants to break in, they can. The deadbolt isn't going to stop them."

  • Copy link
  • Flag this comment
  • Block
Vincent 🌻🇪🇺
@photovince@mastodon.social replied  ·  activity timestamp last week

@sjvn But what maniac stores their floppies upside down?

  • Copy link
  • Flag this comment
  • Block
Xevious
@robsborn@infosec.exchange replied  ·  activity timestamp last week

@sjvn it was enough to keep my colleagues away - who were incapable of returning anything once they’d used it once.

  • Copy link
  • Flag this comment
  • Block
Woodstock
@woodstock@mstdn.canarylabs.eu replied  ·  activity timestamp last week

@sjvn I wish. I would say that the current state of #AI enabled software engineering tools like #windsurf , #cursor, and any other that supports the integration with #mcp services do not come close to this level of security.

  • Copy link
  • Flag this comment
  • Block
SamuelJohnson
@samueljohnson@mstdn.social replied  ·  activity timestamp last week

@sjvn I had stackable banks of drawers for 3.5" disks. Took them to the tropics. Discovered the hard way the effects of thermal cycling on magnetic media. Among other things I lost what turned out to be the only known copy of a long running mailing list. Have some probably unreadable 5.25" media in the attic. And a copy of the Unix V4 tape. 😉

  • Copy link
  • Flag this comment
  • Block
sjvn
@sjvn@mastodon.social replied  ·  activity timestamp last week

@samueljohnson That makes two copies of V4. :-)

  • Copy link
  • Flag this comment
  • Block
Paul Chernoff
@paulc@mstdn.social replied  ·  activity timestamp last week

@sjvn @WarnerCrocker I think I can beat that one.

Floppy disk case with a plastic key to lock it in the case. The key part was simply a cube. Any key could open any drawer.
Floppy disk case with a plastic key to lock it in the case. The key part was simply a cube. Any key could open any drawer.
Floppy disk case with a plastic key to lock it in the case. The key part was simply a cube. Any key could open any drawer.
  • Copy link
  • Flag this comment
  • Block
Aho
@aho@ioc.exchange replied  ·  activity timestamp last week

@sjvn the best was that each brand had their own key, you lost yours you could get the reserve from a friend...

  • Copy link
  • Flag this comment
  • Block
modrobert@qoto.org
@modrobert@qoto.org replied  ·  activity timestamp last week

@sjvn Lock or not, considering it's air gapped and data on passive medium makes it more secure than anything today. USB sticks and SD cards contains microcontrollers where the firmware can be hacked.

  • Copy link
  • Flag this comment
  • Block
Log in

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.0 no JS en
Automatic federation enabled
  • Explore
  • About
  • Members
  • Code of Conduct
Home
Login