Under oath in French Senate, exec says it would be compelled – however unlikely – to pass local customer info to US admin

  • stoy@lemmy.zip
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    2 days ago

    What? Computing in general is not flawed.

    Cloud computing from a data security standpoint has some huge and I would say, unacceptable, flaws though.

    • Ogmios@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      edit-2
      2 days ago

      On-by-default wireless connections are kind of a MASSIVE security issue.

      Really, simply the fact that society keeps trying to force things on computers which are not at all safe to do, is why our current paradigm is so shit.

      • stoy@lemmy.zip
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        1
        ·
        2 days ago

        That has not really anything to do with “computing”, which can be done regardless of what network is used or even without a network.

        This also does not really affect weather or not cloud computing is flawed or not, since you can access the cloud without wireless connections.

        This all being said, wireless networking is a big security problem, we have just collectively decided that the convenience is worth it.

        • Ogmios@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          4
          ·
          edit-2
          2 days ago

          It was just one example dude. The entire system we’ve built is so full of holes it’s basically impossible to safeguard data that ends up on a computer.

          Hell, someone literally hacked and blew up an Iranian nuclear centrifuge which didn’t even have a connection, taking advantage of capabilities which security experts around the world weren’t even aware a computer was capable of.

          • stoy@lemmy.zip
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            2 days ago

            Yeah?

            This is what happens when system complexity grows unconstrained.

            We may look at a piece of software and say, “right, this software is secure!”, but the clock has already started ticking toward the next vulnerability found.

            This does not make the field of computing flawed, but rather the systems we run computing on is flawed.