IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New He's still worried about his secretary?
Do you think he'll be able to understand the concept of [link|http://www.ddj.com/articles/1999/9912/|Attack Trees]?

His point is that....

On identically insecure machines.....

That being, the machines have no physical security or scheduled remote security checks....

An individual with enough time to completely reload and reconfigure your machine....

Will have a SLIGHTLY (my word) easier time if said person has the source code to your OS and apps.

Now, in MY experience, simply swapping the keyboard on your machine (you have physical access, remember) with one that will record keystrokes and then complaining that it doesn't work will accomplish the same goal. The admin will attempt to login using his/her username/password and you have their info.

Now, this requires less time, less expertise, less everything and there is no chance you will be caught because you failed to copy someone's configuration file correctly.

So, is Open Source MORE insecure that closed source IF you have to IGNORE the EASIER attacks on BOTH?

Suppose you have a choice of two banks. Both banks leave their money in handy bags on the front porch at night so the customers can withdraw whatever they want and leave a signed note saying what they took.

But bank #2 doesn't check the signatures on the notes.

Which bank is more insecure?

Duh! Bank #2 is more insecure because you can sign someone else's name!

In other words, a "security" evaluation that requires a stated level of INSECURITY is not a security evaluation.

There is no security without physical security.
New Now imagine the New M$ freebie keyboard bundle..
..maybe with another cockamamie Windoze-oriented key like, Press to RRR

And ..inside, a tad o' flash-ROM and a few listener flags: IF online THEN send contents piggybacked on the "Is My Copy of XP Legit?" packet-set, er ---> send it Home.

{sigh} as 'lectronics gets teenier and teenier, why INSIDE that apparently innocent "keyboard BIOS" chip could be - a mere HAL-8999, a parsin and a savin and a notatin and..

Callin Home just often enough.. Take That! LAM,E

Gotta LOVE them 'encapsulated' stealth packets! (the next Big Thing, if I read correctly)


Ashton
Advanced Product Development, Redmond
What do you want to will you send us Today?
     L.A.M.E. on Slashdot - (drewk) - (6)
         I was wrong; he doesn't sound so "reformed" at all... <SIGH> -NT - (CRConrad) - (2)
             Quoting out of context can be fun - (Meerkat) - (1)
                 Thing is, he kind of has a point - (drewk)
         Re: L.A.M.E. on Slashdot - (folkert)
         He's still worried about his secretary? - (Brandioch) - (1)
             Now imagine the New M$ freebie keyboard bundle.. - (Ashton)

Calculate projected nexus.
32 ms