On Thursday, December 5, 2019 12:57:15 AM MST Nicolas Mailhot via devel wrote:

> Let’s get real, in most businesses, the data will already be available
> in a network share, a common database, etc. Trying to perform fine-
> grained control checks on the mass of data businesses routinely
> manipulate is a loosing game. You always end up needing to trust
> humans.

Let's get real. In most business, the data will also be available in a network 
share. Trying to perform proper separation of permissions is the appropriate 
method of preventing unauthorized users from gaining that data. You don't need 
to "trust humans", other than those who do have access to the data.

> That’s even the case in ultra-secure environments like the NSA. How do
> you think wikileaks happened?

No.

-- 
John M. Harris, Jr.
Splentity

_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org

Reply via email to