• notannpc@lemmy.world
    link
    fedilink
    arrow-up
    8
    arrow-down
    3
    ·
    6 months ago

    Obviously the keys could be stored more securely, but if you’ve got malware on your machine that can exploit this you’ve already got bigger problems.

    • douglasg14b@lemmy.world
      link
      fedilink
      arrow-up
      5
      arrow-down
      7
      ·
      edit-2
      6 months ago

      That’s not how this works.

      This sort of “dismissive security through ignorance” is how we get so many damn security breaches these days.

      I see this every day with software engineers, a group that you would think would be above the bar on security. Unfortunately a little bit of knowledge results in a mountain of confidence (see Dunning Kruger effect). They are just confident in bad choices instead.

      We don’t need to use encryption at rest because if the database is compromised we have bigger problems” really did a lot to protect the last few thousand companies from preventable data exfiltration that was in fact the largest problem they had.

      Turns out that having read access to the underlying storage for the database doesn’t necessarily mean that the database and all of your internal systems are more compromised. It just means that the decision makers were making poor decisions based on a lack of risk modeling knowledge.


      That said the real question I have for you here is:

      Are you confident in your omniscience in that you can enumerate all risks and attack factors that can result in data being exfiltrated from a device?

      If not, then why comment as if you are?