• Darkassassin07@lemmy.ca
    cake
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    11
    ·
    4 months ago

    Potato, potato…

    Whether we call them ‘undocumented commands’ or a ‘backdoor’, the affect is more or less the same; a series of high-level commands not listed within the specs, preventing systems engineers/designers from planning around vulnerabilities and their potential for malicious use.

    • SharkAttak@kbin.melroy.org
      link
      fedilink
      arrow-up
      1
      arrow-down
      3
      ·
      4 months ago

      I don’t get the downvotes, wether you call it backdoor or private API it’s a security hole, and nitpicking on its name won’t help fixing it.

    • ShadowRam@fedia.io
      link
      fedilink
      arrow-up
      3
      arrow-down
      18
      ·
      4 months ago

      The dude that wrote this blog is a goof…

      defines backdoor as “relating to something that is done secretly

      effectively constitute a “private API”, and a company’s choice to not publicly document their private API

      Idiot thinks these are two different things…

      Are they are trying to argue that malicious intent is needed to define it as a back door?

      Moron…

      • FanBlade@lemmynsfw.com
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 months ago

        You’re very smart. I didn’t realize that until you called someone a goof, idiot and moron, but now it’s very clear that you have far superior intelligence.