this post was submitted on 13 May 2026
63 points (98.5% liked)

Privacy

5641 readers
254 users here now

Welcome! This is a community for all those who are interested in protecting their privacy.

Rules

PS: Don't be a smartass and try to game the system, we'll know if you're breaking the rules when we see it!

  1. Be civil and no prejudice
  2. Don't promote big-tech software
  3. No apathy and defeatism for privacy (i.e. "They already have my data, why bother?")
  4. No reposting of news that was already posted
  5. No crypto, blockchain, NFTs
  6. No Xitter links (if absolutely necessary, use xcancel)

Related communities:

Some of these are only vaguely related, but great communities.

founded 2 years ago
MODERATORS
top 17 comments
sorted by: hot top controversial new old
[–] scrubbles@poptalk.scrubbles.tech 28 points 19 hours ago (3 children)

Damn, this is a big one. I've been watching since it started, and I hope it sends shockwaves through the SaaS model. Institutions learned overnight how by trusting one single private company that they were all screwed over, and probably made them even a bigger target. Hopefully they start re-evaluating.

Having worked ed-tech for a while, I'm not surprised. Blackboard, Canvas, all hot garbage. There's a real need there, if someone can do a simple selfhosted (by the university) version with oauth/SSO to campus networks that lets them control their data? It'd be a no brainer, I think most campus IT networks would prefer that.

[–] jaybone@lemmy.zip 1 points 9 hours ago

I have no idea how those looked on the backend or from the IT admin perspective. But the regular user experience was completely awful. It wouldn’t surprise me if the whole thing was complete shit.

[–] Telorand@reddthat.com 8 points 19 hours ago (4 children)

I was thinking about this exact problem, and I came up with a similar idea. There could be a parent company developing the core software and maybe even providing installation and setup services, but each campus ultimately maintains their own self-hosted, zero-trust instance. Each campus would be downstream implementations of the parent software and would only update or talk to other instances as needed.

Given how campuses operate, it seems like they would be great candidates for an optionally federated platform like that.

[–] frongt@lemmy.zip 10 points 18 hours ago

So just traditional software?

[–] tristynalxander@mander.xyz 4 points 16 hours ago* (last edited 16 hours ago)

So just, Software as a Product (SaaP)?

[–] scrubbles@poptalk.scrubbles.tech 7 points 19 hours ago

Ha, think you just discovered the standard model from the 2000s!

But I agree.

[–] Onomatopoeia@lemmy.cafe 3 points 18 hours ago

The problem is CapEx vs OpEx.

[–] dohpaz42@lemmy.world 5 points 19 hours ago (1 children)

My university used to only self host. Now they’re ditching self-hosting for cloud-based SaaS. 🤷‍♂️

[–] Onomatopoeia@lemmy.cafe 3 points 18 hours ago (1 children)

It's because doi g things on site requires CapEx, which then increases your tax liability.

By going SaaS, you offload the entirety of risk.

The problem is the morons who sign these contracts are fucking clueless about ensuring the liability is strong.

[–] scrubbles@poptalk.scrubbles.tech 5 points 17 hours ago

Important to define risk because a lot of software people here(me included) will immediately think "what do you mean their data was hacked". However from a legal standpoint they get to point the finger at Canvas.

[–] wizardbeard@lemmy.dbzer0.com 11 points 19 hours ago (1 children)

Paying out hacker ransom isn't a particularly rare event. The hackers that do it professionally are... professional. If they don't follow through on their side of the agreement then no one pays them.

This isn't some "dangerous precedent" it's a basic business decision that paying up would be cheaper than the alternative options. Normal cyber crime response and remediation shit.

[–] blargh513@sh.itjust.works 2 points 17 hours ago (1 children)

Ha ha, what?

They're criminals. They fucked shit up for money and then held the company hostage. If they don't pay, the ransom group WILL release the data. If they do pay, they might release the data, but they'll just quietly sell it rather than just dumping it.

They're a business. It took time and effort to break in. They want to be paid. If you stiff them, they're going to fuck you in the ear. If they sell your data after the fact, what are you going to do? Complain to the manager?

They're not professional, they're extortionists that don't give two shits if they're respected. They steal what's previous and threaten to dump it or sell it back. Their reputation is already shit, why would they care otherwise? This is such a naive take.

[–] osaerisxero@kbin.melroy.org 11 points 17 hours ago (1 children)

I think this is the more naive take. If it was a given that the information would be public either way, noone would ever pay. Ransomware groups rely on a reputation of withholding their end of the arrangement or the corporate bean counters could never justify the payout to them.

[–] jaybone@lemmy.zip 2 points 8 hours ago (1 children)

It’s interesting though. For lots of other crimes, people don’t pay ransoms. For example the recent kidnapping of that tv personality’s mother in Arizona. And in those cases, such an arrangement or transaction, when completed fulfills both sides and it’s done. In this case, there is no guarantee that data doesn’t end up sold on the dark web regardless of whether the payment is made. And plenty of other let’s say not as “professional” hacker groups (I put in quotes for lack of a better word, and that’s a term we are using in this thread) sometimes can’t decrypt your shit because they are running shredware rather than ransomware. Or they just fucked up and don’t know what they are doing. So it’s a big chance you are taking.

And yes, some of the “professional” groups have essentially a “customer support” team, which you contact and they help walk you through the process of paying the ransom and whatever else, applying the decryption etc.

[–] Couldbealeotard@lemmy.world 1 points 8 hours ago* (last edited 4 hours ago)

When someone gets kidnapped there's no CEO that can go to jail for a privacy breach. Data breaches typically stay out of the news, if it becomes public the victim company can face legal action. It can literally be cheaper the quietly pay the hackers.

[–] Auster@thebrainbin.org 6 points 18 hours ago (1 children)

There's no honor among the dishonorable, as a Brazilian analyst would say:

I wouldn't doubt the thieves are still holding to copies of the data they stole, just waiting either for another opportunity to blackmail those affected again, to use the data for other nefarious means as a shell group, or to sell it to another ill-intended group without leaving traces.

From stealing and putting a price on people's private data and possibly their safety, and to the possibility of dishonoring a "sales" contract, the morality bar was already pretty low on the two concrete cases, so the third would be easy to do on this standpoint.

[–] Randomocity@sh.itjust.works 2 points 17 hours ago

Ransomware gangs are actually normally pretty good about this. If they leak afterwards they lose all credibility to get another company to pay in the future.