this post was submitted on 11 May 2026
275 points (98.9% liked)

Technology

84534 readers
3632 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 25 comments
sorted by: hot top controversial new old

I always thought it was kind of standard process to kill all of a users processes, and cancel their credentials before telling someone they're fired.

[–] Auth@lemmy.world 5 points 4 hours ago

21 years is to short for destroying that much public data.

[–] Deconceptualist@leminal.space 47 points 9 hours ago (1 children)

Over several hours, the brothers deleted approximately 96 databases storing government information, including systems tied to case management and Freedom of Information Act request processing. The affected systems were hosted on servers in Ashburn, Virginia.

Damn. If they deleted NSA or CIA data they could have been heroes. Deleting FOIAs and people's equal opportunity cases is just shitty.

[–] stoly@lemmy.world 13 points 5 hours ago

This is definitely a case of hurting anyone they could rather than targeting their rage. Now members of the public have to suffer it.

[–] subignition@fedia.io 109 points 13 hours ago (1 children)

Are we gonna gloss over the fact that the EEOC was storing plaintext passwords? Fucking incompetent

[–] orclev@lemmy.world 47 points 13 hours ago (4 children)

Yeah and whoever designed that system needs to be fired. 40 years ago you could maybe call it a reasonable mistake (although it wasn't really acceptable even back then), but these days anyone storing plaintext passwords anywhere is bordering on criminal negligence. Unless you have a damned good reason passwords should be hashed, but at a minimum at least encrypted with something reasonably secure.

[–] stoly@lemmy.world 4 points 5 hours ago (1 children)

I'd like to say that nobody cared about security even 25 years ago, but in government, they have ALWAYS cared about security.

[–] SeductiveTortoise@piefed.social 3 points 5 hours ago* (last edited 4 hours ago)

25 years ago I was still programming in php and I was salting my passwords before hashing even back then.

[–] SeductiveTortoise@piefed.social 10 points 8 hours ago

Salt it, hash it, put it in a stew.

[–] PlantJam@lemmy.world 27 points 12 hours ago (2 children)

I would argue that there is no such thing as a good reason to store plain text passwords.

[–] TeddE@lemmy.world 1 points 5 hours ago

I'm comfortable with boot having a either a plaintext key or two key halves to XOR together, used to unlock the base OS. I honestly don't trust a TPM to store this, and as long as the OS is designed to guard the key from all but root, I don't see any security issue.

[–] SeductiveTortoise@piefed.social 4 points 8 hours ago

They are not saying that you should have a good reason to store plain text, but to have a good reason not to hash, but only to encrypt.

[–] Soulphite@reddthat.com 2 points 11 hours ago

If it was anyone hired by the current administration to be the security software engineer, I'd imagine it being someone severely under qualified with some kind of reality TV, media background who probably only mentioned "I stayed at a Holiday Inn last night.." when asked if they had any security authentication background. The interviewer probably just got a grand kick out of that response and after an intense belly laugh said, "Fuck it, you're hired!"

[–] raman_klogius@ani.social 53 points 13 hours ago (1 children)

Ok now charge those broccoli-permed goons of Musk's

[–] CmdrShepard49@sh.itjust.works 3 points 5 hours ago

At least we can feel content in the knowledge that one of them was dragged from their car and had the shit beat out of him.

[–] zergtoshi@lemmy.world 12 points 10 hours ago

Bobby tables strikes again.
Just in case: https://xkcd.com/327/

[–] stoy@lemmy.zip 52 points 14 hours ago

The managers who gave him that access should also be put on trial

[–] Prove_your_argument@piefed.social 23 points 12 hours ago

Just pull backups from the DOGE guys.

[–] Skullgrid@lemmy.world 19 points 13 hours ago (2 children)

they didn't even delete any bullshit DBs like ones doing dragnet surveillance

[–] sp3ctr4l@lemmy.dbzer0.com 2 points 9 hours ago

Because those one are how Palantir makes money.

[–] boogiebored@lemmy.world 1 points 10 hours ago (1 children)
[–] KairuByte@lemmy.dbzer0.com 0 points 3 hours ago

Funnily enough, credit scores have literally nothing to do with the government.

[–] dhork@lemmy.world 2 points 11 hours ago
[–] toiletobserver@lemmy.world 3 points 13 hours ago

Chaotic good?

[–] RabbitBBQ@lemmy.world -1 points 7 hours ago

It takes a lot of restraint to have total access to important systems and be in a poorly ending situation with a company.