Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On Sat, 8 Sep 2012 12:33:35 +0000 "Edward Ned Harvey (blu)" <blu at nedharvey.com> wrote: > this scenario. It's just an esoteric point of paranoia, which you > should care about only if you're an employee of the NSA or MI6. Or a financial trading company with valuable software. Because nobody has ever stolen a competitor's code. Or a physics PhD candidate. Because nobody has ever stolen someone else's thesis research. Or an FBI agent with a list of a million iPhone UDIDs. Because nobody has ever broken into an FBI computer and swiped such lists. Or a web board operator with thousands of password hashes. Because no web board password lists have ever been compromised. Or your address book on your personal computer. Because no spambot has ever built spam lists from personal address books on compromised nodes. > In any event, this is certainly not useful discussion in relation to > the OP, logging in simultaneously from multiple clients. It's relevant to the security of such installations when there is little or no physical security around workstations. -- Rich P.
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |