The Common Vulnerabilities and Exploitations database is a collective and comprehensive database for computer security. It’s critical for maintaining nearly any computing device. The US Government helped fund it as a necessary resource until April 16, 2025. A consortium of partners foresaw this and were prepared, establishing a foundation to keep it running.
Tag: computer security
-
The evil housekeeper problem
The evil housekeeper problem refers to a concept in computer security where once somebody is in the room where your computer is, security of that device can no longer be guaranteed. And right now, we are seeing this play out in real time with Elon Musk and DOGE.
You might think that there would be technical measures to stop someone right out of high school from coming in and changing the code to a government system. That the system could require two-factor authentication to deploy the code to the cloud. That you would need a smart card to log in to a specific system to do that. Nope—all those technical measures can be circumvented by coercion at the hands of the evil housekeeper.