Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yes, and anything that warrants higher security doesn't happen from a Dev machine, and isn't possible with just creds on a Dev machine.

They are horribly insecure by nature. They almost all have root, they download and install tons of software, they are often portable, and us developers aren't infallible and will eventually fuck up.

Systems that require better security won't rely on any one or even 2 dev systems, and yes that requires more time and effort, but it's better than the alternative of hoping all of your developers never make a single mistake.

It's not perfect, but if you have a perfectly secure system, I'd love to hear it!



I don't have a good solution, but I come from a time when, if a machine was compromised, you changed every one's security tokens and re-imaged the affected machines.

Have you read "On trusting trust?"




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: