Hacker News new | past | comments | ask | show | jobs | submit login
Avoid Building a Security Treadmill (macchaffee.com)
4 points by Ozarkian 3 months ago | hide | past | favorite | 2 comments



Don’t allow any network connections at all?

See also https://en.wikipedia.org/wiki/Confused_deputy_problem


Yes. Quoting the author:

"For example, the ability for nearly every application to have full, unfettered access to the entire Internet is a deeply-held and rarely-challenged assumption. Cryptocurrencies generally cannot be mined without a constant internet connection since you need to receive information about the latest "blocks". Denying all outbound network traffic except for a few allow-listed hosts would be one non-treadmill solution, with the added bonus of thwarting exfiltration attacks, 2-stage malware attacks, and command-and-control servers."




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: