From: "Randy Brukardt" <randy@rrsoftware.com>
Subject: Re: library/binding for sftp?
Date: Thu, 8 Aug 2013 14:18:09 -0500
Date: 2013-08-08T14:18:09-05:00 [thread overview]
Message-ID: <ku0qti$6nr$1@loke.gir.dk> (raw)
In-Reply-To: 20130808133709.09dfef98@hactar.xn--rombobjrn-67a.se
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #1: Type: text/plain, Size: 2162 bytes --]
"Björn Persson" <bjorn@xn--rombobjrn-67a.se> wrote in message
news:20130808133709.09dfef98@hactar.xn--rombobjrn-67a.se...
Dmitry A. Kazakov wrote:
>> Firstly, there is no protection against targeted attack. Secondly,
>> regarding spies, they aren't any good in programming. Obscuring is
>> the best method against unfocused surveillance which works only with
>> known protocols.
>
>Four false statements in a row.
There are only three here, and the first is generally accepted as true (see
below).
>Dmitry isn't going to change his mind so I won't debate this with him
>further, but to everybody else: Don't listen to Dmitry. He doesn't
>understand basic information security and is giving dangerous advice.
Then you better debate it with me, because at least part of Dmitry's advice
matches what I would give.
Everything I read about security says that there is "no practical defense
against a determined attacker". That's a bit more nuanced than Dmitry's
statement, but it's repeated all of the time by the security experts I read.
You might be able to stop such an attack by unplugging all of your internet
connections and shutting down all of your computers, but even that isn't
certain. And who can do that for long?
And Dmitry's point about spies (like the NSA) using "known protocols" is
certainly true. They are much less likely to generally monitor what they
don't know about. Of course, if they are targetting you directly, see
statement 1.
Honestly, your attitude is dangerously naive. Probably the best strategy of
all is to have no secrets that need protecting, as in today's environment
you should assume all information is being read (or could be read) by
someone.
When RRS was doing business with the NSA back in the 1980s, we used to
occassionally talk to the light fixtures to remind ourselves of the
possibility of survialence. We thought it was reasonably likely that we were
spied upon even then, and it's 100 times easier today (we didn't have a
network - we used sneaker-net - and weren't connected to any public network
until we started working on Ada 9x).
Randy.
next prev parent reply other threads:[~2013-08-08 19:18 UTC|newest]
Thread overview: 39+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-08-05 12:41 library/binding for sftp? Stephen Leake
2013-08-05 15:18 ` Dmitry A. Kazakov
2013-08-06 6:24 ` Stephen Leake
2013-08-06 6:54 ` Dmitry A. Kazakov
2013-08-07 10:06 ` Stephen Leake
2013-08-07 13:04 ` Dmitry A. Kazakov
2013-08-07 17:15 ` Simon Clubley
2013-08-07 19:57 ` Dmitry A. Kazakov
2013-08-07 20:09 ` Alan Jump
2013-08-07 20:26 ` Dmitry A. Kazakov
2013-08-07 20:32 ` Alan Jump
2013-08-08 9:14 ` Björn Persson
2013-08-08 9:49 ` Dmitry A. Kazakov
2013-08-08 11:37 ` Björn Persson
2013-08-08 19:18 ` Randy Brukardt [this message]
2013-08-08 20:03 ` Alan Jump
2013-08-09 9:19 ` Björn Persson
2013-08-09 20:21 ` Randy Brukardt
2013-08-09 8:49 ` Björn Persson
2013-08-09 20:12 ` Randy Brukardt
2013-08-19 17:26 ` Stefan.Lucks
2013-08-19 18:15 ` AdaMagica
2013-08-19 22:45 ` Randy Brukardt
2013-08-19 23:15 ` Randy Brukardt
2013-08-20 6:43 ` Georg Bauhaus
2013-09-13 9:58 ` Oliver Kleinke
2013-09-13 21:12 ` Georg Bauhaus
2013-08-20 8:14 ` Stefan.Lucks
2013-08-20 20:59 ` Randy Brukardt
2013-08-21 7:27 ` Stefan.Lucks
2013-08-21 16:46 ` Alan Jump
2013-08-22 5:53 ` Per Sandberg
2013-08-26 21:21 ` Randy Brukardt
2013-08-24 8:06 ` David Thompson
2013-08-24 11:26 ` Stefan.Lucks
2013-08-07 21:46 ` Dennis Lee Bieber
2013-08-07 17:44 ` Björn Persson
2013-08-05 18:40 ` Jeffrey Carter
2013-08-06 6:26 ` Stephen Leake
replies disabled
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox