Jump to content

Wikipedia talk:Wikipedia Signpost/2016-04-01/Technology report

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Hmm I feel some of the hardware hasn't been properly battle tested yet. Something a bit more old school might be a better choice:

https://www.youtube.com/watch?v=X9dpXHnJXaE

©Geni (talk) 21:05, 1 April 2016 (UTC)[reply]

  • This may have comic aspects, but it is well informed and insightful. And it is true that TELNET had one clear advantage - it dates back to a time when program was program and data was data. There probably really isn't a special character sequence that indicates the following output should actually be saved and executed to take over your computer. I miss that kind of program that you could look and see you genuinely can't hack me with it, versus these things that have a new critical vulnerability whenever the old one expires. That said, I wouldn't be surprised if even the TELNET approach doesn't work against that Tor exploit, because (even if Snowden has never said a peep about it) I am suspicious that your saved uuencoded kiddie porn would be recognized by your friendly local antivirus program as a "threat", duly reported to their site, and it would upload a "patch" to you to help fix the virus, with predictable results. But I've never heard such a thing in the news ... and doubt I will this time either. Wnt (talk) 14:38, 2 April 2016 (UTC)[reply]
  • It's always better to write your own telnet client. Every session, for the best security. All the best: Rich Farmbrough, 19:30, 2 April 2016 (UTC).[reply]