hungrybread [comrade/them]@hexbear.nettoWorld News@lemmy.ml•U.S. Seizes Cargo Jet Iran Illegally Sold To VenezuelaEnglish
9·
9 months agoUnrelated 3rd party gets mad at 1st party for transaction with 2nd party. 4th party (neighbor of 2nd party) steals transacted item on behalf of 3rd party. Seems legit.
I figured US sanctions in this case would just limit which companies can interact with US based companies and within US borders, isn’t that how sanctions on Cuba work? Obviously the US just does what it wants but it’s not clear to me how this was legally justified, if at all.
This same criticism is validly launched at software devs all the time lol.
One thing I’ve anecdotalally seen and heard is hardware guys indicating that something is rock solid and solved because it’s old, so building on top of it isn’t a problem. Obviously we have to build on the old to get to the new, but if we just skip auditing hardware due to age we end up deploying vulnerable hardware globally. Spectre and Meltdown are an interesting example where I’ve heard from at least one distinguished professor that “everyone” believed branch prediction design/algorithms were essentially done. Was it adequately assessed from a security POV? Clearly not, but was it assessed from a security POV in general? I have no idea, but it would be nice as a tech enthusiast and software guy to see the other side of the fence take these things seriously in a more public way, in particular when it comes to assessing old hardware for new attack vectors.