dimitarvp

dimitarvp

What does a developer advocate do?

What does a developer advocate do for a living? I mean, what is it that you are paid to do? I’ve seen your description below but it doesn’t tell me much. Could you elaborate?

There are some people who believe Android devices are remotely pwned by default and Google and the OEM vendor can take a peek at any moment they want. So not sure what security could even exist on such phones?

Most Liked

dimitarvp

dimitarvp

Oh, I am not claiming anything about iOS vs. Android, just what I heard from people who were very much into electronics. No, I don’t have links, and I agree that conspiracy theories are normal. I am not saying that I believe them – but there would be a strong vested interest if all mobile device’s security can be remotely compromised at any time by governments, don’t you think? Basically, “follow the money and power” thing. :slight_smile:

I am not a conspiracy theorist but in the rush to have working technology people do take shortcuts and this has been acutely visible in the last several years – literally every week there are news about personal data leaks of hundreds of millions of people whose details are now on the net.


Thanks for your clarifications. From them I gather you are a programmer who also does demos and advocates for certain practices – now I understand the title better. :slight_smile:

Exadra37

Exadra37

I don’t believe that mobile devices, computers or any other type of device can all be remotely compromised by design at anytime by the government, but the reality is that Software is more buggy that anyone may think, and this is all true down into the firmware and backbone infrastructure of the internet. Some believe that some of this bugs are left there intentionally in order to be exploited by who know they exist, like the manufacturer, the government and ??? So they are not an explicit backdoor, because normally you need to chain them together to compromise a device.

So all the attackers need to do is to find exploits, specially Zero day exploits and chain them together in very clever and imaginative ways in order to compromise remotely or not the security of a device, and this is happening all the time in computers, routers, mobile phones, TVs, IOT devices, Cameras, Medical Devices, you name it :wink:

It’s in the wild for a lot of years a virus/trojan that survives resets of your computer, reinstall of the operating system. To get ride of it you need to buy a new disk.

Also is in the wild a virus/trojan for your home router that let’s the command and control server switch off from the internet all the home users that have their router compromised by it. This is an effective way to shut of regions of a country or even an entire country from accessing the internet(when the % of compromised routers is huge). To fix it you need to replace the router, because a factory reset will not fix it.

Do you want me to continue?

Exadra37

Exadra37

To be honest the scope changes with companies. In some companies you spend more time in conferences and meetups, and preparing for them, then doing anything else.

Where Next?

Popular General Dev topics Top

dimitarvp
What does a developer advocate do for a living? I mean, what is it that you are paid to do? I’ve seen your description below but it doesn...
New
AstonJ
Stopwords are words that you normally filter for things like search queries, such as ‘as’, ‘because’ etc - there are a few online, but I ...
New
DevotionGeo
The version of Java installed with Android Studio on my Mac is the following (when I run java -version) openjdk version "1.8.0_242-relea...
New
New
harwind
I have an array of objects in JavaScript, and I want to sort them based on a specific property of the objects. For example, I have an arr...
/js
New
harwind
I have an array of strings in JavaScript, and I need to convert it into a single string with specific delimiter characters between the el...
/js
New
harwind
I’m working on a web application where users can sign up with their email addresses. To ensure data integrity, I want to implement client...
/js
New
jaeyson
Hi! I received an email from shopperapproved.com, I’ll copy-pasta here: Hi , Would you be willing to help future Manning.com customers...
New
New
dPhong31415
Hey everyone :waving_hand: I’ve just recently discovered Elixir, and honestly—it’s been mind-blowing so far (coming from a React backgro...
New

Other popular topics Top

AstonJ
SpaceVim seems to be gaining in features and popularity and I just wondered how it compares with SpaceMacs in 2020 - anyone have any thou...
New
AstonJ
If you are experiencing Rails console using 100% CPU on your dev machine, then updating your development and test gems might fix the issu...
New
PragmaticBookshelf
Learn different ways of writing concurrent code in Elixir and increase your application's performance, without sacrificing scalability or...
New
DevotionGeo
The V Programming Language Simple language for building maintainable programs V is already mentioned couple of times in the forum, but I...
New
PragmaticBookshelf
Create efficient, elegant software tests in pytest, Python's most powerful testing framework. Brian Okken @brianokken Edited by Kat...
New
PragmaticBookshelf
Use WebRTC to build web applications that stream media and data in real time directly from one user to another, all in the browser. ...
New
mafinar
This is going to be a long an frequently posted thread. While talking to a friend of mine who has taken data structure and algorithm cou...
New
hilfordjames
There appears to have been an update that has changed the terminology for what has previously been known as the Taskbar Overflow - this h...
New
New
PragmaticBookshelf
Develop, deploy, and debug BEAM applications using BEAMOps: a new paradigm that focuses on scalability, fault tolerance, and owning each ...
New