this post was submitted on 07 Dec 2024
95 points (96.1% liked)

Showerthoughts

30024 readers
1357 users here now

A "Showerthought" is a simple term used to describe the thoughts that pop into your head while you're doing everyday things like taking a shower, driving, or just daydreaming. A showerthought should offer a unique perspective on an ordinary part of life.

Rules

  1. All posts must be showerthoughts
  2. The entire showerthought must be in the title
  3. Avoid politics
    • 3.1) NEW RULE as of 5 Nov 2024, trying it out
    • 3.2) Political posts often end up being circle jerks (not offering unique perspective) or enflaming (too much work for mods).
    • 3.3) Try c/politicaldiscussion, volunteer as a mod here, or start your own community.
  4. Posts must be original/unique
  5. Adhere to Lemmy's Code of Conduct

founded 2 years ago
MODERATORS
top 38 comments
sorted by: hot top controversial new old
[–] [email protected] 48 points 2 weeks ago (1 children)

Dude. Most people can't understand it TOADY.

[–] [email protected] 39 points 2 weeks ago (3 children)

Perhaps they used to know it but FROGOT

[–] [email protected] 7 points 2 weeks ago

This makes me hoppy.

[–] felbane 7 points 2 weeks ago

I thought about it ANURA right, they probably just don't remember.

[–] Anticorp 4 points 2 weeks ago* (last edited 2 weeks ago)

Then they should AXOLOTL questions, so they can remember.

[–] CerealKiller01 26 points 2 weeks ago (2 children)

Telegraph and wire transfers were a thing 100 years ago, you could say "Everyone have a telegraph at home. Private communication, for example orders to your bank to wire money, uses codes/cyphers that can be decoded if the third party was smart enough".

You'd have to go back before the discovery of electricity, and even then you could make an analogy with lighthouses (which isn't really a stretch, as fiber optic cables can be described as point-to-point light houses), and most people at most periods are probably familiar with the idea of talking in codes.

Technology isn't really that hard to explain. Social change is much harder. Try explaining to someone from 1920 that the US had a black president and nothing catastrophical happened, or that all professions today are open to women and you'd have a much harder time.

[–] Moc 13 points 2 weeks ago

They used encryption when using carrior pigeons for centuries. Pretty easy to explain the concepts when, for example, MTM attacks were actually happening thousands of years ago.

[–] [email protected] 26 points 2 weeks ago (1 children)

Honestly, it’s not as difficult as you might think. People have been using codes and cyphers as long as there has been writing and probably much before then. Explaining the need to keep things secret while communicating to people who are modern enough to have radio? Pretty easy.

[–] [email protected] 1 points 2 weeks ago (3 children)

Explaining why things connect to the internet and then get compromised by foreign attackers?

Hard. People would be like "why would you connect to the same system as Russia"

[–] CerealKiller01 12 points 2 weeks ago

For the same reason western European countries have roads connecting them to Russia.

[–] [email protected] 3 points 2 weeks ago* (last edited 2 weeks ago)

For the same reason that everyone used the Knights Templar or Venetian bankers to pass messages and money.

EDIT: And you’re talking only 100 years ago. We had radios, telegraphs and telephones 100 years ago. It was reasonably common knowledge that it was possible to listen in on those even if you weren’t the intended recipient. Heck, part of the plot of The Count of Monte Cristo (1846) involves hacking a telegraph system with a MIM attack to manipulate international financial markets.

[–] [email protected] 1 points 2 weeks ago (1 children)

You do realize that we're not, right? There are private lines that run for secure communication.

[–] [email protected] 1 points 2 weeks ago (1 children)

I wish

The thing is people want easy and air gapping the system is not easy.

[–] [email protected] 1 points 2 weeks ago

You wish? Not sure i follow.. Perhaps I should be more clear in my comment in response to the other user: There are currently, in use, private air-gapped point-to-point lines that go across the Atlantic between the US and specific countries for secure communication. In fact there are a ton of them.

[–] [email protected] 20 points 2 weeks ago (1 children)

You must follow these rituals to prevent the evil spirits from possessing your true name.

[–] [email protected] 3 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

We’re talking about 1920s here, not 1320s. People had already seen telephones, cars and electric lightbulbs at the time.

[–] [email protected] 3 points 2 weeks ago

Replace evil spirits with gremlins then.

[–] HoneyMustardGas 18 points 2 weeks ago (2 children)

So, you've got a name, a date of birth, an address and a whole lot of personal information and secrets, everybody's got secrets. Let's say there was a device that had a glass window that lit up and there were words and pictures on it. Now, let's say that you wanted to share the latest [insert cultural reference from a century ago, lol] news with your buddies and your opinions. Let's say you wanted to gamble, let's say you wanted to communicate with them through this device. The medium you would be using is called email. Wayyy faster than a post master's parcel or letter delivery. The channel or means to be able to communicate is called the Internet or the web. This name is given because it is a series of connections that allows you and your device to be linked to all the others.

Now, let's say that Company A wants to sell some service through this device. You want it but you only have dollars and coins. Paper and metal money. It is easy to transfer information from one device to another but how will you get your money there. You can give it to the mailman but it would take too long and you still have to wait. So, you have this harder than paper card. With numbers on it, connected to a bank. You keep your money in their account but instead of taking it out physically, the number "registers" it as the money leaving the account and going to Company A so they can send you their product.

Well, your neighbor is jealous that you have so much money and packages coming to your door by way of automobile delivery or horse and carriage. They are sour because your grass is always fed the finest of plant food supplements. They are envious because your grass is literally greener but they cannot afford to pay for a device like yours let alone expensive plant food from Company A.

They decide to "steal" your device but it is locked inside your house. They go down to the pub and talk a bunch of shit to the barkeep. He says for a price he has a guy who can get the numbers for your account right off your device without the need to break into your house for a small price.

So, he pays him and you lose all your money. Your grass is dying and somehow your jobless, drunk slob of a neighbor starts having the greenest glowing grass. You get suspicious.

So you go down to the pub and drown your sorrows in booze with the last of your money. And the barkeep overhears you complaining. He says for a price, he can put some numbers and letters into your device and make it so no one, not even him can get in. This is his pitch. He says he will only charge a small fee per month for this. So you pay him with your last bit of coins.

Now, your neighbor can't access your information without breaking into your home. Of course, you curse the makers of this device to begin with for not making their devices more secure in the first place. You wonder if they are all in kahoots with each other trying to make money off of every last thing. But nevertheless, you are happier, safer and more secure and soon you get paid and your jobless neighbor is soon broke and balance is restored. For now, until the barkeep decides to offer a better service to your neighbor.

That is what cybersecurity is and the simplest way to explain to someone from the 1920s, I guess. And the need for it to always have to improve.

[–] [email protected] 9 points 2 weeks ago
[–] [email protected] 4 points 2 weeks ago* (last edited 2 weeks ago)

!remindme -100 years

[–] [email protected] 13 points 2 weeks ago* (last edited 2 weeks ago) (2 children)

I kinda think people from the far past could understand modern concepts if explained in terms they are familiar with and that it is an advanced form of technology made by a human. They're not unfamiliar with tools or technology. Explaining electricity might still be seen as magic... Shit I know how it works and it still seems pretty magical to me 🤷🏻‍♂️

[–] [email protected] 3 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

Exactly, for the topic of cybersecurity you could take the metaphor of a fort that is under constant attack and has to be defended for example and you could explain it reasonably well to people who lived thousands of years ago.

[–] NJSpradlin 4 points 2 weeks ago

Combine the fort metaphor with some shamanistic spirit mantra about protecting your hidden secrets of your mind and done.

[–] [email protected] 1 points 2 weeks ago

Imagine explaining that the power grid is connected to a network that is accessible by Russia.

[–] [email protected] 10 points 2 weeks ago

Okay so imagine you have your gold in a bank.

And to get that gold, you need a piece of paper with some numbers.

That piece of paper is in your house and if you don’t lock it up, someone can take it, possibly someone you willingly let into your house.

[–] [email protected] 9 points 2 weeks ago (1 children)

Don't reveals your true name to the fae, be weary of their temptations and offers, don't allow one to follow you home.

[–] [email protected] 4 points 2 weeks ago

This is great

[–] [email protected] 8 points 2 weeks ago (1 children)

100 years ago was only a few years after World War 1, that is not ancient history.

[–] perviouslyiner 2 points 2 weeks ago* (last edited 2 weeks ago)

1954 Lord of the Rings featured danger from remote surveillance, and a shadow world with different security concerns than the regular world...

[–] [email protected] 8 points 2 weeks ago

Codebooks, codes and use of ephemisms to describe scertain things are very, very ancient.

Using electric machines with sophisticated software can be tough to explain, but I'm sure those who used cyphers to encrypt their messages as far as 18th century warfare or even earlier can get around that fancy thing that also does it for them for they don't need to memorise anything.

[–] [email protected] 7 points 2 weeks ago

It's like aerial defense against carrier pigeons.

[–] Neverclear 4 points 2 weeks ago

Lock your doors. Guard your keys. Close your windows. Treat any other actions as calculated risks.

[–] TheBananaKing 2 points 2 weeks ago

Nah. Fraud is fraud.

Yes, this document says it has this guy's signature on it, but how do you know what his signature is meant to look like?

Same concept just scaled up.