• CerealKiller01@lemmy.world
    link
    fedilink
    arrow-up
    26
    ·
    5 days ago

    Telegraph and wire transfers were a thing 100 years ago, you could say “Everyone have a telegraph at home. Private communication, for example orders to your bank to wire money, uses codes/cyphers that can be decoded if the third party was smart enough”.

    You’d have to go back before the discovery of electricity, and even then you could make an analogy with lighthouses (which isn’t really a stretch, as fiber optic cables can be described as point-to-point light houses), and most people at most periods are probably familiar with the idea of talking in codes.

    Technology isn’t really that hard to explain. Social change is much harder. Try explaining to someone from 1920 that the US had a black president and nothing catastrophical happened, or that all professions today are open to women and you’d have a much harder time.

    • Moc@lemmy.world
      link
      fedilink
      arrow-up
      13
      ·
      5 days ago

      They used encryption when using carrior pigeons for centuries. Pretty easy to explain the concepts when, for example, MTM attacks were actually happening thousands of years ago.

        • GregorGizeh@lemmy.zip
          link
          fedilink
          arrow-up
          8
          arrow-down
          1
          ·
          5 days ago

          The silly part is that the abbreviation keeps growing longer and more cryptic each time I look somewhere else. Can’t keep up with all the things that are a sexual orientation now.

          That is not to say those people shouldn’t have the right to be and live however they wish to be, just that I can’t be bothered to keep track of the lingo.

          • azulavoir@sh.itjust.works
            link
            fedilink
            arrow-up
            4
            arrow-down
            1
            ·
            5 days ago

            That’s the idea behind the + - anyone trying to put more things “up front” is really just distracting from the point that we’re all in this building together

        • TranquilTurbulence@lemmy.zip
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          5 days ago

          This may sound radical, but listing every gender and sexual minority is more than a simple acronym can realistically handle.

  • BartyDeCanter@lemmy.sdf.org
    link
    fedilink
    arrow-up
    26
    ·
    6 days ago

    Honestly, it’s not as difficult as you might think. People have been using codes and cyphers as long as there has been writing and probably much before then. Explaining the need to keep things secret while communicating to people who are modern enough to have radio? Pretty easy.

    • Possibly linux@lemmy.zipOP
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      5 days ago

      Explaining why things connect to the internet and then get compromised by foreign attackers?

      Hard. People would be like “why would you connect to the same system as Russia”

      • BartyDeCanter@lemmy.sdf.org
        link
        fedilink
        arrow-up
        3
        ·
        edit-2
        5 days ago

        For the same reason that everyone used the Knights Templar or Venetian bankers to pass messages and money.

        EDIT: And you’re talking only 100 years ago. We had radios, telegraphs and telephones 100 years ago. It was reasonably common knowledge that it was possible to listen in on those even if you weren’t the intended recipient. Heck, part of the plot of The Count of Monte Cristo (1846) involves hacking a telegraph system with a MIM attack to manipulate international financial markets.

          • fmstrat@lemmy.nowsci.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            5 days ago

            You wish? Not sure i follow… Perhaps I should be more clear in my comment in response to the other user: There are currently, in use, private air-gapped point-to-point lines that go across the Atlantic between the US and specific countries for secure communication. In fact there are a ton of them.

  • Jake Farm@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    20
    ·
    6 days ago

    You must follow these rituals to prevent the evil spirits from possessing your true name.

  • Theo@lemmy.world
    link
    fedilink
    English
    arrow-up
    18
    ·
    6 days ago

    So, you’ve got a name, a date of birth, an address and a whole lot of personal information and secrets, everybody’s got secrets. Let’s say there was a device that had a glass window that lit up and there were words and pictures on it. Now, let’s say that you wanted to share the latest [insert cultural reference from a century ago, lol] news with your buddies and your opinions. Let’s say you wanted to gamble, let’s say you wanted to communicate with them through this device. The medium you would be using is called email. Wayyy faster than a post master’s parcel or letter delivery. The channel or means to be able to communicate is called the Internet or the web. This name is given because it is a series of connections that allows you and your device to be linked to all the others.

    Now, let’s say that Company A wants to sell some service through this device. You want it but you only have dollars and coins. Paper and metal money. It is easy to transfer information from one device to another but how will you get your money there. You can give it to the mailman but it would take too long and you still have to wait. So, you have this harder than paper card. With numbers on it, connected to a bank. You keep your money in their account but instead of taking it out physically, the number “registers” it as the money leaving the account and going to Company A so they can send you their product.

    Well, your neighbor is jealous that you have so much money and packages coming to your door by way of automobile delivery or horse and carriage. They are sour because your grass is always fed the finest of plant food supplements. They are envious because your grass is literally greener but they cannot afford to pay for a device like yours let alone expensive plant food from Company A.

    They decide to “steal” your device but it is locked inside your house. They go down to the pub and talk a bunch of shit to the barkeep. He says for a price he has a guy who can get the numbers for your account right off your device without the need to break into your house for a small price.

    So, he pays him and you lose all your money. Your grass is dying and somehow your jobless, drunk slob of a neighbor starts having the greenest glowing grass. You get suspicious.

    So you go down to the pub and drown your sorrows in booze with the last of your money. And the barkeep overhears you complaining. He says for a price, he can put some numbers and letters into your device and make it so no one, not even him can get in. This is his pitch. He says he will only charge a small fee per month for this. So you pay him with your last bit of coins.

    Now, your neighbor can’t access your information without breaking into your home. Of course, you curse the makers of this device to begin with for not making their devices more secure in the first place. You wonder if they are all in kahoots with each other trying to make money off of every last thing. But nevertheless, you are happier, safer and more secure and soon you get paid and your jobless neighbor is soon broke and balance is restored. For now, until the barkeep decides to offer a better service to your neighbor.

    That is what cybersecurity is and the simplest way to explain to someone from the 1920s, I guess. And the need for it to always have to improve.

  • Grandwolf319@sh.itjust.works
    link
    fedilink
    arrow-up
    11
    arrow-down
    1
    ·
    5 days ago

    Okay so imagine you have your gold in a bank.

    And to get that gold, you need a piece of paper with some numbers.

    That piece of paper is in your house and if you don’t lock it up, someone can take it, possibly someone you willingly let into your house.

  • 🇰 🌀 🇱 🇦 🇳 🇦 🇰 ℹ️@yiffit.net
    link
    fedilink
    English
    arrow-up
    13
    ·
    edit-2
    6 days ago

    I kinda think people from the far past could understand modern concepts if explained in terms they are familiar with and that it is an advanced form of technology made by a human. They’re not unfamiliar with tools or technology. Explaining electricity might still be seen as magic… Shit I know how it works and it still seems pretty magical to me 🤷🏻‍♂️

    • Pechente@feddit.org
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      6 days ago

      Exactly, for the topic of cybersecurity you could take the metaphor of a fort that is under constant attack and has to be defended for example and you could explain it reasonably well to people who lived thousands of years ago.

      • NJSpradlin@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        6 days ago

        Combine the fort metaphor with some shamanistic spirit mantra about protecting your hidden secrets of your mind and done.

  • andrew_bidlaw@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    8
    ·
    5 days ago

    Codebooks, codes and use of ephemisms to describe scertain things are very, very ancient.

    Using electric machines with sophisticated software can be tough to explain, but I’m sure those who used cyphers to encrypt their messages as far as 18th century warfare or even earlier can get around that fancy thing that also does it for them for they don’t need to memorise anything.

    • perviouslyiner@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      5 days ago

      1954 Lord of the Rings featured danger from remote surveillance, and a shadow world with different security concerns than the regular world…

  • shani66@ani.social
    link
    fedilink
    arrow-up
    9
    ·
    6 days ago

    Don’t reveals your true name to the fae, be weary of their temptations and offers, don’t allow one to follow you home.

  • TheBananaKing@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    6 days ago

    Nah. Fraud is fraud.

    Yes, this document says it has this guy’s signature on it, but how do you know what his signature is meant to look like?

    Same concept just scaled up.