The Dink Network

Reply to Re: Millimeter talks about copyright

If you don't have an account, just leave the password field blank.
Username:
Password:
Subject:
Antispam: Enter Dink Smallwood's last name (surname) below.
Formatting: :) :( ;( :P ;) :D >( : :s :O evil cat blood
Bold font Italic font hyperlink Code tags
Message:
 
 
January 9th 2016, 05:40 PM
dinkdead.gif
millimeter
Peasant He/Him Canada
Millimeter is Wee-Lamm, Recording Artist. :-) 
Data:
The digital gyroscope present on mobile devices is a known point of intrusion. As a transmitter/receiver, it broadcasts the existence of the device and provides a portal of access. Breaking through the security measures can be accomplished remotely in mere minutes, using brute force methods. This is why Corporate networks should not embrace BYOD policy as the cost of providing a secure device is cheaper than recovering from an aggressive intrusion.

One feature of open source ...
Yes, but the average user is more likely to use "open source", simply to rebel against Corporate monopoly. This is not entirely a bad thing, but anyone could insert malware into a distribution prior to hand it off to a non-technical end user. If we could ensure that all distributions were malware free then the cost vs quality would lean even more heavily in favor of open source. What percentage of open source distribution occurs over P2P networks, which allow potentially thousands of opportunity to inject unwanted artifacts into the application?

For us geeks and even most near geeks, open sources certainly has it's place. Personal security is still a potential risk for the Mom & Pop who only use their computer to read email, view facebook, and do their online banking.
*n.b. being in Europe, you would call me a nerd and not a geek. Simply, I don't wear cologne named eau-de-bike courier.

Windows 8 is doing so well

The average person doesn't have the time nor technical desire to try to install something to replace Windows or OSX, depending on the platform. They just want to turn it on, click at most 3 buttons, then be on facebook (for example). Windows 8's biggest feature is that it resembles the same interface used on mobile devices, and finding the "App" you need does not require remembering what the icon looks like. You tap the screen, start typing "face" then select facebook from the list of 2-5 items in the list, and in moments you're sharing photos and getting angry or depressed at everyone's rants.

I have worked in IT since the late 80's, many years as a desk-side technician, added in network objects as far as the Lan/Wan interface, with some cisco, and currently I am working POS projects for several national scale retail entities. I have learned that the average end user is more focused on accomplishing the tasks they need to and care little about how the computer accomplishes it. I remember one client, it was an Os2 environment using warp server.

I attended her desk and listened to her issue, then asked "is it okay if I use your chair?

She answered, "I won't be able to get any work done".

I said, "respectfully, you can't get any work done until I correct your issues.". (yes I smiled gently here).

Not if you do it right. If you use good encryption, only the sender and receiver of the data can understand it.

Respectfully, it would make it 'nearly' impossible for the average citizen who happens on the signal to gain access before their conscience talked them out of it, but for someone intent on gaining access it does not. The needful things to gain access to a system are, 20% knowing the system exists, 60% gaining a physical connection, and 20% circumventing the intrusion detection ans security measures. Wireless transmission is considered a physical connection, so at that point you have only the 20% that relates to the logical connection left to deal with.

Defcon and Cyberlympics would be worth researching, if you are convinced that encryption alone can completely secure a wireless connection. It can slow them down a bit and make it a little awkward, but once there is a physical connection, authentication is only a hinderance. Social engineering may be the weakest link in any network security system. In fact, providing a wireless network access point allows more potential to intrusion than using a hardwire (including FOC) connection.

Also, having both a fax-line or dial-up connection as well as a physical Lan connection attached to the same device at the same time, provides opportunity to bypass authentication protocol ... this should be avoided. Simply, if there's a wire (even if it's air) there is a physical connection.

Comparing to your house analogy, if they know you exist they can try to find out where you live. Once they know your address, it comes down to simply waiting until you are not home and finding a way in, even if that amounts to simply smashing a window.