this post was submitted on 02 Nov 2025
149 points (100.0% liked)

Opensource

4354 readers
262 users here now

A community for discussion about open source software! Ask questions, share knowledge, share news, or post interesting stuff related to it!

CreditsIcon base by Lorc under CC BY 3.0 with modifications to add a gradient



founded 2 years ago
MODERATORS
 

The "Bundeskanzlei" is already switching to opensource solutions and will keep in contact with Army Chief Süssli.

you are viewing a single comment's thread
view the rest of the comments
[–] BanMe@lemmy.world 9 points 2 weeks ago (2 children)

Is there no standard or best practices for government computing, internationally? Because surely someone needs to be steering leaders who don't know much away from locked-in proprietary solutions. Seems like a UN opportunity or something.

[–] schnurrito@discuss.tchncs.de 1 points 2 weeks ago

"Government computing" is way too broad a term for there to be a standard for it. There are many open standards for many aspects of computing, and adopting them is obviously a good thing, but every institution has different needs.

[–] themeatbridge@lemmy.world 0 points 2 weeks ago (1 children)

The trouble with publishing best practices is it's a blueprint for how to break in, like publishing a map to your house with all the locks and cameras labelled. If you establish that 2 factor authentication is required, with SHA256 encryption and passwords at least 16 characters, numbers, upper and lower case, and special characters, changed every six months, then the hackers know what they need. They need to spoof someone's cell phone, they know how long it takes to decrypt sha256, and they know if your password was FuckingBullsh1tsecurity!3 two years ago, it's probably FuckingBullsh1tsecurity!7 today.

[–] afk_strats@lemmy.world 3 points 2 weeks ago

Sorry but that's not how computing best practices and computer security work. We're far beyond "security through obscurity". Security now works on encryption schemes which are highly publicized and vetted by multiple parties. That goes in combination with protecting through policy like access controls, endpoint protection and monitoring, and security training.