On Wed, December 13, 2017 2:41 pm, Stefan Monnier wrote:
>> The weakest link in most chains of Data protection is the person that
>> has access to it.
>
> And rather than breaking knuckles, sometimes it's more ...elegant.. to
> just fool/seduce the target,
>
>
> Stefan
We know. Poor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed, Dec 13, 2017 at 11:41:08AM -0500, Stefan Monnier wrote:
> > The weakest link in most chains of Data protection is the person that
> > has access to it.
>
> And rather than breaking knuckles, sometimes it's more ...elegant.. to
> just
> The weakest link in most chains of Data protection is the person that
> has access to it.
And rather than breaking knuckles, sometimes it's more ...elegant.. to
just fool/seduce the target,
Stefan
tomas writes:
> Or, as Schneier put it "the NSA is better at breaking knuckles
> than at breaking codes".
Not NSA. That would be trespassing on another agency's territory.
--
John Hasler
jhas...@newsguy.com
Elmwood, WI USA
The weakest link in most chains of Data protection is the person that
has access to it.
Always keep that in mind.
On 12/13/2017 12:34 PM, x9p wrote:
> On Wed, December 13, 2017 6:17 am, to...@tuxteam.de wrote:
> ...
>> If they target *you* individually, yes, they have cheaper means at
>> their
On Wed, December 13, 2017 6:17 am, to...@tuxteam.de wrote:
...
> If they target *you* individually, yes, they have cheaper means at
> their disposal. That's called "rubber hose cryptanalysis"[1] -- not
> pretty. Or, as Schneier put it "the NSA is better at breaking knuckles
> than at breaking
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Dec 12, 2017 at 10:25:18PM -0200, x9p wrote:
>
> On Tue, December 12, 2017 8:00 am, to...@tuxteam.de wrote:
> ...
> > That said, this kinds of attacks are so complex that [...] it
> > possibly takes the resources of a nation-state [...]
> If
On Tue, December 12, 2017 8:00 am, to...@tuxteam.de wrote:
...
> That said, this kinds of attacks are so complex that (as in the
> case of Stuxnet) it possibly takes the resources of a nation-state
> (or, in this case, probably two) to set something up like that.
> OTOH things are pretty fluid
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Dec 12, 2017 at 05:09:59AM -0500, Anil Duggirala wrote:
> Think for yourself a bit: technically it is perfectly possible. The
> > Linux partition is accessible from windows and, given some sort of
> > library for "understanding" the file
Think for yourself a bit: technically it is perfectly possible. The
> Linux partition is accessible from windows and, given some sort of
> library for "understanding" the file system (probably ext4), files
> can be modified this way. Vice-versa, the windows partition will be
> accessible from
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Dec 12, 2017 at 04:40:07AM -0500, Anil Duggirala wrote:
> Ill ask another question here. Is having dual boot Windows 10 (or 7 or
> 8) and Linux a security risk? Will malicious Windows programs gain
> access to Linux files (files in the Linux
Ill ask another question here. Is having dual boot Windows 10 (or 7 or
8) and Linux a security risk? Will malicious Windows programs gain
access to Linux files (files in the Linux partition?)? Does GPT help
here?
thanks,
On Mon, Dec 11, 2017, at 09:31 PM, Dan Purgert wrote:
> -BEGIN PGP
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Long Wind wrote:
> i have Windows XP and Linux on one diskis there any XP virus that can
> spread to linux?
> Thanks!
Generally no, given that Windows and Linux use different executable
formats. That being said, you can still spread infected files
13 matches
Mail list logo