ZeroGravitas@lemm.eetoTechnology@lemmy.world•what if the hacker provided the public key for https connection?English
2·
7 months agoNevermind hackers. Look up “corporation in the middle” attacks, which is a prime example of subverting secure channels at scale.
If you don’t own the hardware, nothing you do on it is truly private. Ditto if someone else has admin access to your hardware (eg BYOD scenarios) . Inserting a root certificate into the OS is trivial in both cases.
Perfect human beings don’t exist. Apparently there’s a religion positing there was one perfect human, but we nailed him to a cross for interfering with business.
Here’s a thought. If you were able to get away with Almost Anything ™ and were surrounded by people praising your genius, dashing good looks and boundless generosity towards their persons, how long would it take for you to lose your moral compass, you think? You would pretty soon lose your frame of reference to the normal people, and your empathy would follow. And that’s assuming you’re not 2nd or 3rd generation ultra rich, in which case you never had it to begin with.
Succession is a very good TV series exploring the mindset of such people, if you want to see it in action. Otherwise, history is full of examples - such as Nero, the greatest poet to ever set fire to Rome.
I know there are exceptions, like everywhere else in life. But those tend to cultivate humility as a habit, like other people go to the gym.