it's time for my trump card

theFibonacciEffect@feddit.de to 196@lemmy.blahaj.zone – 889 points –
124

You are viewing a single comment

I would hope if she was she would have a seperate not-gaming Laptop for work.

Would be more professional, but shes Trumps lawyer so I guess there is not much to expect in the way of professionalism.

What exactly is the problem here? What's wrong with using a gaming laptop for work?

Well either she is unneccesarily using a gaming Laptop for non-gaming.

Or she uses her private gaming laptop for work and doesnt separate between those two spheres, which is unprofessional and potentially dangerous in regards to privacy security.

unneccesarily using a gaming Laptop for non-gaming.

I don't see why this would be an issue, it's a computer after all.

Using her own machine for sensitive work like that, on the other hand, I do see the point. Unless there is some sort of dual boot setup involved.

If she bought a gaming laptop specifically for work (this is the way you end up with a gaming laptop that’s not also your personal laptop) then it’s a silly, unnecessary, ill suited decision. There are other laptops with better battery life, cheaper, lighter, etc etc etc…. That fit the lawyer usecase better. Why would a lawyer buy a gaming laptop to lawyer?

IANAL but I don’t think you need discrete graphics for lawyer applications. But who knows, maybe she’s running an ML model locally to tell her what to do.

9 more...

nothing (besides a waste) unless it means you are using your work laptop to game.

There are plenty of reasons besides gaming to have a laptop with a dedicated GPU. There isn’t really many low end professional options, they start over $2k. 3D modelling, video rendering, ML and a bunch of other professional uses are significantly improved with dedicated hardware.

Who knows, maybe she’s running LLaMA on it locally so no one catches her using AI to write her rebuttals.

unless it means you are using your work laptop to game.

Why is this a bad thing? Why would you have separate computers, when you can have one good one?

Security issues. It's standard security policy for most companies to separate private and work.

So have a drive for work and one for play. Bill the laptop to work but spec it for what you want at home.

Not even that. She could be dual booting windows with windows on two separate encrypted partitions. There's going to be someone at work who knows how to set it up.

And why can't she know how to set that up if she chooses? Because she's a girl? You people are gross. If you want to criticize her for something, let it be for representing Trump in the first place.

No, she can't know it because she is a lawyer that represents Trump. Why did you though we have a problem with her gender?

She's clearly too young to have her own practice. Whatever firm she works for placed her on his case. Her intelligence cannot be defined by the client she represents. She's smart enough to pass the bar. I'd wager she's also smart enough not to hand her personal laptop to some neckbeard to set up for her. It's highly questionable at this point whether Trump can even get a firm big enough to have in house IT to work for him.

Nothing to do with their sexual identity or gender. It's the fact that the average person doesn't know how to do it. Most people working in a company stuff have IT that sets things up for them. If they can do it themselves, then hell, that's great and I'm happy for them. But I wouldn't assume anything because of someone's gender or sexual identity. I think that's silly.

If you care for a personal example, the company I work for has IT which give us work phones. The IT department set the phones up themselves. Because of the way the phone has been set up, there's incredibly little that can go tits up and there's a lot of security built in (no admin, enforced long passwords, probably more that I'm forgetting).

I'm more than capable of setting up my phone and having it be secure myself without IT doing it. Maybe she can too. Is it a usual thing for IT to thing up in a business setting, (unless you're a programmer) probably.

Even if she works for a firm, which is likely as she looks a bit young to own her own practice, they did not provide that laptop. That is clearly hers. And unless they are a fairly large law firm, they do not have a dedicated IT guy, let alone department. I'd bet Trump would be hard pressed to get a large firm to work for him, given his reputation.

I mean, this is all speculation. How can you be sure that she couldn't just request that laptop? I don't know the circumstances.

As far as institutions go, there's even fairly small ones that have at least 1 person who's job is IT, not to mention it is also possible to outsource that position entirely.

I don't know. Maybe I'm wrong about this entire situation but that doesn't make me a sexist like you implied :/

This can slow a hacker down, but still a bad bad bad security practice.

How so? If you have 2 partitions encrypted separately with, say, Veracrypt, the worst thing the infected partition could do is copy the other encrypted partition. Unless I'm missing something?

You can download a copy of the encrypted partition and attempt to crack it locally.

Which depending on how deep your cascade encryption goes can require a huge amount of computation. If you're a small business owner running a restaurant or a student, that's plenty of security. If you're the lawyer for a former POTUS in a history-defining trial that might decide the future of the entire planet, I hope to God you're not relying on that encryption.

Then again it might be the same dirt that foreign intelligence already has on Trump, so maybe it doesn't matter either way.

My friend, I hope you realise that cracking a Veracrypt partition is going to take longer than the heat death of the universe even if we use every computer ever produced. It's not feasible to crack a partition with brute force. The one way to break it is if they have some password lists or something.

I've actually been thinking about this. Another very hard but possible way that I can think could work would be to take the targeted partition in its entirety, then alter the boot process in such a way where the user is tricked into producing their password at boot to the encrypted partition. The password would then be sent over the air to the attacker where they can simply decrypt the partition. I'm not sure what that would entail though.

9 more...
9 more...