I believe that in the depths of the cold war, when personal computers were just showing up, it was decided, deep within the National Security Agency,that it was more advantageous to let them continue to proliferate without fostering secure Operating Systems, though they were available.
We all now live with the blowback from that decision. Most people don't even realize that actually secure computing is a possibility now, even here on HN.
This general insecurity means that anything exposed to raw internet will be compromised and therefore significant resources must be expended to manage it, and recover after any incidents.
It's no wonder that most people don't want to actually run their own servers. Thus we give up control and this .... Situation .... Is the result.
I affirmatively argue that actually secure computing is not a possibility. It's fun to build toy models where every process has exactly the permissions it needs and no more, sure. In the real world, your users are going to grant superuser/admin permissions to random installers, and they're not going to perform the complex verification rituals you told them to do beforehand.
It's like trying to set up a warehousing system so perfect that the shrinkage rate is 0.
We all now live with the blowback from that decision. Most people don't even realize that actually secure computing is a possibility now, even here on HN.
This general insecurity means that anything exposed to raw internet will be compromised and therefore significant resources must be expended to manage it, and recover after any incidents.
It's no wonder that most people don't want to actually run their own servers. Thus we give up control and this .... Situation .... Is the result.