dimitarvp

dimitarvp

What does a developer advocate do?

What does a developer advocate do for a living? I mean, what is it that you are paid to do? I’ve seen your description below but it doesn’t tell me much. Could you elaborate?

There are some people who believe Android devices are remotely pwned by default and Google and the OEM vendor can take a peek at any moment they want. So not sure what security could even exist on such phones?

Most Liked

dimitarvp

dimitarvp

Oh, I am not claiming anything about iOS vs. Android, just what I heard from people who were very much into electronics. No, I don’t have links, and I agree that conspiracy theories are normal. I am not saying that I believe them – but there would be a strong vested interest if all mobile device’s security can be remotely compromised at any time by governments, don’t you think? Basically, “follow the money and power” thing. :slight_smile:

I am not a conspiracy theorist but in the rush to have working technology people do take shortcuts and this has been acutely visible in the last several years – literally every week there are news about personal data leaks of hundreds of millions of people whose details are now on the net.


Thanks for your clarifications. From them I gather you are a programmer who also does demos and advocates for certain practices – now I understand the title better. :slight_smile:

Exadra37

Exadra37

I don’t believe that mobile devices, computers or any other type of device can all be remotely compromised by design at anytime by the government, but the reality is that Software is more buggy that anyone may think, and this is all true down into the firmware and backbone infrastructure of the internet. Some believe that some of this bugs are left there intentionally in order to be exploited by who know they exist, like the manufacturer, the government and ??? So they are not an explicit backdoor, because normally you need to chain them together to compromise a device.

So all the attackers need to do is to find exploits, specially Zero day exploits and chain them together in very clever and imaginative ways in order to compromise remotely or not the security of a device, and this is happening all the time in computers, routers, mobile phones, TVs, IOT devices, Cameras, Medical Devices, you name it :wink:

It’s in the wild for a lot of years a virus/trojan that survives resets of your computer, reinstall of the operating system. To get ride of it you need to buy a new disk.

Also is in the wild a virus/trojan for your home router that let’s the command and control server switch off from the internet all the home users that have their router compromised by it. This is an effective way to shut of regions of a country or even an entire country from accessing the internet(when the % of compromised routers is huge). To fix it you need to replace the router, because a factory reset will not fix it.

Do you want me to continue?

Exadra37

Exadra37

To be honest the scope changes with companies. In some companies you spend more time in conferences and meetups, and preparing for them, then doing anything else.

Where Next?

Popular General Dev topics Top

Jase
Any opinions on the best platform for dev-friendly blogging?
New
Jase
Do they publish their stacks or is it mostly a case of guesswork? Twitter facebook instagram snapchat tiktok google et all. Used to be we...
New
AstonJ
This article got me thinking about encrypted chat: Europol said that French police had discovered some of EncroChat’s servers were lo...
New
dimitarvp
What does a developer advocate do for a living? I mean, what is it that you are paid to do? I’ve seen your description below but it doesn...
New
New
PaulMartin
Hey everyone! Do you have any tips or free resources that can help me learn Rspec? Although I know how to write some Rspec, I’m not very...
New
harwind
I’m working on a SQL query for a database containing records of customer transactions. Each transaction has a transaction_id, customer_id...
New
harwind
Given an array of integers, find the length of the longest increasing subsequence. A subsequence is a sequence that can be derived from a...
New
harwind
Hi, Take a riveting look at exception handling in Java programming, including the complicated dance between try-catch blocks, checked an...
New
Tazmeen
Hello, I am new to this forum. Not really sure if this topic is relevant for this chat at all. I apologize if its not. I am trying to c...
New

Other popular topics Top

AstonJ
There’s a whole world of custom keycaps out there that I didn’t know existed! Check out all of our Keycaps threads here: https://forum....
New
Rainer
Not sure if following fits exactly this thread, or if we should have a hobby thread… For many years I’m designing and building model air...
New
Exadra37
Oh just spent so much time on this to discover now that RancherOS is in end of life but Rancher is refusing to mark the Github repo as su...
New
AstonJ
Saw this on TikTok of all places! :lol: Anyone heard of them before? Lite:
New
AstonJ
Biggest jackpot ever apparently! :upside_down_face: I don’t (usually) gamble/play the lottery, but working on a program to predict the...
New
New
PragmaticBookshelf
Author Spotlight: Tammy Coron @Paradox927 Gaming, and writing games in particular, is about passion, vision, experience, and immersio...
New
PragmaticBookshelf
Author Spotlight: Sophie DeBenedetto @SophieDeBenedetto The days of the traditional request-response web application are long gone, b...
New
AstonJ
This is cool! DEEPSEEK-V3 ON M4 MAC: BLAZING FAST INFERENCE ON APPLE SILICON We just witnessed something incredible: the largest open-s...
New
AstonJ
Curious what kind of results others are getting, I think actually prefer the 7B model to the 32B model, not only is it faster but the qua...
New