Create an Account
username: password:
 
  MemeStreams Logo

MemeStreams Discussion

search


This page contains all of the posts and discussion on MemeStreams referencing the following web page: how they have been tested. You can find discussions on MemeStreams as you surf the web, even if you aren't a MemeStreams member, using the Threads Bookmarklet.

how they have been tested
by noteworthy at 7:42 am EST, Dec 18, 2014

Thomas Wadlow:

Whatever components or services you choose, consider how they have been tested for trustworthiness. Consider these principles attributed to Auguste Kerckhoffs, a Dutch linguist and cryptographer, in the 19th century:

* The system should be, if not theoretically unbreakable, then unbreakable in practice.

* The design of a system should not require secrecy, and compromise of the system design should not inconvenience the correspondents.

David Sanger:

What is remarkable in this case is that after three weeks of pressure, the attack forced one of Hollywood's largest studios, and Japan's most famous companies, to surrender.

Brooks Barnes:

Once the hackers threatened physical violence, the film's cancellation became almost inevitable, even though Sony spent a day steadfastly maintaining its plans for the release and premiere. The incident is likely to be remembered as a failure of Hollywood leadership.

Hackers claim to have taken at least 100 terabytes of Sony data.

Bruce Schneier:

Nobody noticed that 100 TB, yes T. of data was moving thru the pipes? Really?

Eriq Gardner:

The massive hack by the so-called Guardians of Peace and ongoing leaks could raise unprecedented legal issues for Sony for years to come. Now that eyes are open, it might be hard to shut them.

Alain de Botton:

The primary error ... lies in overlooking a central fact about people in general ... that everyone has something very substantially wrong with them once their characters are fully known ... We can't yet know what the problems will be, but we can and should be certain that they are there, lurking somewhere behind the facade, waiting for time to unfurl them.

Kevin Mandia:

Ninety five percent of networks are compromised in some way.

Jane Austen:

What are men to rocks and mountains?

Li Po:

We sit together, the mountain and me,
until only the mountain remains.


 
 
Powered By Industrial Memetics