• Darkassassin07@lemmy.ca
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    24
    ·
    21 hours ago

    Potato, potato…

    Whether we call them ‘undocumented commands’ or a ‘backdoor’, the affect is more or less the same; a series of high-level commands not listed within the specs, preventing systems engineers/designers from planning around vulnerabilities and their potential for malicious use.

    • futatorius@lemm.ee
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      4
      ·
      19 hours ago

      In that case, every stack that you use is riddled with those and we are all hosed. And yet somehow your computer, your phone and the internet keep on working most of the time.

    • ShadowRam@fedia.io
      link
      fedilink
      arrow-up
      5
      arrow-down
      31
      ·
      21 hours ago

      The dude that wrote this blog is a goof…

      defines backdoor as “relating to something that is done secretly

      effectively constitute a “private API”, and a company’s choice to not publicly document their private API

      Idiot thinks these are two different things…

      Are they are trying to argue that malicious intent is needed to define it as a back door?

      Moron…

      • FanBlade@lemmynsfw.com
        link
        fedilink
        English
        arrow-up
        10
        arrow-down
        1
        ·
        18 hours ago

        You’re very smart. I didn’t realize that until you called someone a goof, idiot and moron, but now it’s very clear that you have far superior intelligence.