The Dink Network

Reply to Re: Millimeter talks about copyright

If you don't have an account, just leave the password field blank.
Username:
Password:
Subject:
Antispam: Enter Dink Smallwood's last name (surname) below.
Formatting: :) :( ;( :P ;) :D >( : :s :O evil cat blood
Bold font Italic font hyperlink Code tags
Message:
 
 
January 16th 2016, 12:37 AM
dinkdead.gif
millimeter
Peasant He/Him Canada
Millimeter is Wee-Lamm, Recording Artist. :-) 
I will go over each of the posts to see if I actually neglected your questions, but I feel that your perspective is different than mine and you aren't hearing my comments as answers.

Specifically, your answers suggest that you believe that Software alone determines how secure a device is. Certainly, software can stop many attacks and severely cripple others but the software can only stop an intrusion that is already in progress.

More specifically, you keep referring to software whereas I am speaking to hardware. The sensors may require some software to convert the data they generate, into a form usable by the end user or even internal apps, but even without software, the sensors can still be powered. The microphone, for example, does not require software to generate an electromagnetic field from sounds in the environment, and this field can be detected, regardless of only being a mere few millivolts...but I'm getting wordy again.

I'm sure you've heard the term, "Intrusion Detection" but not "Intrusion Prevention". Once a device is active, there is no way to completely prevent an intrusion, we can only detect an intrusion and attempt to remove the threat, or at least limit what it can accomplish.

While I read over our past comments, perhaps this will enlighten you as to how insecure our mobile devices really are or at least lead you to further research.

http://dvlabs.tippingpoint.com/blog/2012/10/05/eusecwest-mobile-pwn2own-2012-recap

Mm.