• 6 Posts
  • 322 Comments
Joined 2 years ago
cake
Cake day: July 2nd, 2023

help-circle







  • By denying access to resources in a primary region, one might force traffic to an alternate infrastructure with a different configuration. Or maybe by overwhelming hosts that distribute BGP configurations. By denying access to resources, sometimes you can be routed to resources with different security postures or different monitoring and alerting, thus not raising alarms. But these are just contrived examples.

    Compromising devices is a wide field with many different tools and ideas, some of which are a bit off the wall and nearly all unexpected, necessarily.











  • Interesting that you chose Reddit as an example. They have a fascinating origin story with respect to data mart. Early Reddit had just two tables: Thing and Data, where Thing was metadata about types and Data was a three column table with: type, id, and value.

    Wrap your head around that. All of Reddit, two tables. A database couldn’t be less normalized (final boss of normal forms) and they did it in an rdb. So horrific it’s actually kind of cool.