Article on Schneier

From The Star in Malaysia.

Posted on June 13, 2008 at 2:41 PM • 10 Comments

Comments

BobJune 13, 2008 4:12 PM

Just FYI, this page won't load in firefox for me.

Error Message:

Content Encoding Error

The page you are trying to view cannot be shown because it uses an invalid or unsupported form of compression.

* Please contact the web site owners to inform them of this problem.

Davi OttenheimerJune 13, 2008 4:21 PM

"no matter what you do to beef up security, it will not be enough"

And yet...

"That’s how crime or threats work, Schneier said, where there are always levels which are deemed acceptable."

In other words, we know that nothing will be enough in an absolute sense, but we can determine a level and call it "acceptable".

I agree.

By the way, it seems that someone decided that your article was acceptable but did not do enough checking...

"Schneider admits that none of the measures are foolproof."

Yeah, just like spelling your name right.

Hairy DudeJune 13, 2008 8:17 PM

@Bob: I got that as well. Ctrl-Shift-R (cache-bypassing reload) seems to fix it.

ZarutianJune 13, 2008 8:46 PM

What about POLA (principle of least authority/access) and object-capabilities (which combine designation and authorization into one thing: an unforgible reference)?

Sure, those arent any magic or siver bullets but never the less they are an start of an solution of making computer security unintrusive and usable.
(Yes, I know it sounds like an oxymoron ;-)

http://www.eros-os.org/essays/capintro.html is an good intro to capabilities.

Also see http://erights.org/ for more about this stuff.

With hope of intersting dialogue.
-Zarutian

CipherChaosJune 17, 2008 2:03 PM

@Bruce Schneier

From the article:
"15. Install an e-mail and file encryptor. Encrypting all your e-mail or your entire hard drive is unrealistic, but some mail is too sensitive to send in the clear. Similarly, some files on your hard drive are too sensitive to leave unencrypted."

Umm... I can't imagine this having come from you, Bruce.

Surely, you'd be one to advocate transparent, full hard-drive encryption (like TrueCrypt or LUKS), right?

Leave a comment

Allowed HTML: <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre>

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.