

Malicious compliance is when you follow a order or law knowing that it will backfire on those who issued it.
“Lawfare” is a comparable term but not quite it (basically legal harassment campaigns).
Cryptography nerd
Fediverse accounts;
Natanael@slrpnk.net (main)
Natanael@infosec.pub
Natanael@lemmy.zip
Bluesky: natanael.bsky.social
Malicious compliance is when you follow a order or law knowing that it will backfire on those who issued it.
“Lawfare” is a comparable term but not quite it (basically legal harassment campaigns).
Or make a rule that bosses have to try out everything they suggest for others first, let them Darwin award themselves instead of others
A MAC is symmetric and can thus only be verified by you or somebody who you trust to not misuse or leak the key. Regular digital signatures is what’s needed here
You can still use such a signing circuit but treat it as an attestation by the camera’s owner, not as independent proof of authenticity.
[Windows subsystem] for [executable environment] is the naming scheme. The default is Win32, there’s one for POSIX (practically never used), and Linux runs in another.
https://stackoverflow.com/a/41409419