The “Bundeskanzlei” is already switching to opensource solutions and will keep in contact with Army Chief Süssli.

  • 6nk06@sh.itjust.works
    link
    fedilink
    arrow-up
    19
    arrow-down
    1
    ·
    3 days ago

    Only skeptical to a company that has been fucking customers and their privacy for the past 30 years?

  • BanMe@lemmy.world
    link
    fedilink
    arrow-up
    9
    ·
    3 days ago

    Is there no standard or best practices for government computing, internationally? Because surely someone needs to be steering leaders who don’t know much away from locked-in proprietary solutions. Seems like a UN opportunity or something.

    • schnurrito@discuss.tchncs.de
      link
      fedilink
      arrow-up
      1
      ·
      3 days ago

      “Government computing” is way too broad a term for there to be a standard for it. There are many open standards for many aspects of computing, and adopting them is obviously a good thing, but every institution has different needs.

    • themeatbridge@lemmy.world
      link
      fedilink
      arrow-up
      2
      arrow-down
      2
      ·
      3 days ago

      The trouble with publishing best practices is it’s a blueprint for how to break in, like publishing a map to your house with all the locks and cameras labelled. If you establish that 2 factor authentication is required, with SHA256 encryption and passwords at least 16 characters, numbers, upper and lower case, and special characters, changed every six months, then the hackers know what they need. They need to spoof someone’s cell phone, they know how long it takes to decrypt sha256, and they know if your password was FuckingBullsh1tsecurity!3 two years ago, it’s probably FuckingBullsh1tsecurity!7 today.

      • afk_strats@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        3 days ago

        Sorry but that’s not how computing best practices and computer security work. We’re far beyond “security through obscurity”. Security now works on encryption schemes which are highly publicized and vetted by multiple parties. That goes in combination with protecting through policy like access controls, endpoint protection and monitoring, and security training.

  • Tempus Fugit@midwest.social
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    3 days ago

    No shit, we should all be skeptical of these giant tech corporations. All the US ones are currently capitulating to a corrupt tyrant. They’ll turn on their customers the minute it’s profitable. They only care for money. They can’t be trusted, period.

  • chicken@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    5
    arrow-down
    1
    ·
    3 days ago

    This is from the autotranslated version of the article but

    He therefore calls for a separate, private cloud solution for classified documents to be examined.

    Why does a word processor need to involve the “cloud” at all?

    • themeatbridge@lemmy.world
      link
      fedilink
      arrow-up
      10
      ·
      edit-2
      3 days ago

      Because people want to share documents across various computers. A secure cloud is better than people emailing classified pdfs to authorized distribution lists, or carrying around the document you’re working on in a thumb drive.

      That said, I wouldn’t trust Microsoft, either.

      • freeman@feddit.orgOP
        link
        fedilink
        arrow-up
        3
        ·
        3 days ago

        And they being stored in a “cloud” (or NAS) is necessary for every bigger institution nowadays. Because people work together and not each for themselves in their own libreoffice writer.

    • Sidhean@piefed.social
      link
      fedilink
      English
      arrow-up
      5
      ·
      3 days ago

      “Private Cloud” sounds like “our server. (that we have. in our military building.)”