The $Customer will have his Pizza and Entertainment well served, functioning and NOW for $0 costs. So how will you provide security under this circumstances?
Impossible. Beside the fact, that this entire NSA-Story is funny as hell. Why? Deal with it, deal with the world you (the crowd) would like to have. You got already warned. More than once. do you really care about security? yes? thats funny in times were big Companies like the T-Com are shipping their OEM-Ed Netgear hardware with all credentials printed on the back side. there are: SSID, WLAN-WPA2-KEY, MAC. What do you need more? So the customer isn't interested in security. the Workers at the backbones are customers too that also use this shit and they didn't care about is. only few ppl. like us care about it. otherwise it wouldn't possible that the NSA could spread their tentacles so far. So forget about it. do not worry be happy. Netgear, for the fun called their App for mobiles "Genie". lol The Customers (the crowd) called out ppl. that warned them as "paranoid idiots". OTOH they dictate you to invent and make bullshit, even if you pointed the bullshit and the consequences out. they like to get bullshit. so they should get it. Without my help please. i stopped to work at those areas after i got pressed to make to much bullshit. This is not only spreaded in the B2C market, its spreaded all around. even if there are planned out times for exactly this. Upgrade the backbone Switches. the planned times get not used for it. huhhhhh its too dangerous.... huuuhh....it will not go afterwards.... i anwered all the times such sayings with: fine, silence. we need more of it. So do not care to much about it. Make a business out of if and specialize at a certain point on closing security holes the easy way, just by upgrading. Tell them about some black magic and things they would never understand and that those things are so crazy that they are close to god. may be they believe you than and may be they honor your work not just for the fact that everything runs. ========= also interesting: ACPI-Hypervisor Trojans. I watched 2004-2007 goings on Black Hat around http://en.wikipedia.org/wiki/Blue_Pill_(software) and afterwards the Proof-Of-Concept ACPI-VM-Trojan got taken off from the net. everything seemed cleaned up. Though i am not sure if i have a back up. lol what about ACPI and Switches/Routers an VMM capabilities of their CPU's? if that ACPI-VMM-Thingy is in the hands of Intelligence Agencies, we must not longer care only about Operating Systems and Customer Software. Any Ideas to this? = = = http://michael-schuh.net/ = = = Projektmanagement - IT-Consulting - Professional Services IT Rev. Michael Schuh<http://dudeism.com/ordcertificate?ordname=Michael+Schuh&orddate=05/20/2012> *Ordained Dudeist Priest <http://dudeism.com/>* Postfach 10 21 52 66021 Saarbrücken phone: 0681/8319664 @: m i c h a e l . s c h u h @ g m a i l . c o m = = = Ust-ID: DE251072318 = = = 2013/9/5 Jim Pingle <li...@pingle.org> > On 9/4/2013 8:33 PM, Robert Guerra wrote: > > Curious on people's comments on types of routers, firewalls and other > appliances that might be affected as well as mitigation strategies. Would > installing a pfsense and/or other open source firewall be helpful in anyway > at a home net location? > > The text you sent seems to primarily focus on infrastructure routers -- > those used at ISPs, peering points, etc. Home routers are a different > breed, but suffer the same or more problems. > > Aside from the example Chris gave, here's another good one from earlier > this year: > > http://securityevaluators.com/content/case-studies/routers/soho_service_hacks.jsp > > But it doesn't matter if the vendors issue a patch, people actually have > to install the update to fix it, and odds are high that typical end > users have no idea that is even possible or something they have to do. > > Jim > > _______________________________________________ > List mailing list > List@lists.pfsense.org > http://lists.pfsense.org/mailman/listinfo/list >
_______________________________________________ List mailing list List@lists.pfsense.org http://lists.pfsense.org/mailman/listinfo/list