On Wed, May 25, 2016 at 6:02 PM, Chris Bennett
<chrisbenn...@bennettconstruction.us> wrote:
> 1. The small bad guys. They can put up compromised install files and sig
> files. They laugh at the damage the did to you. Jajaja.
>
> 2. The worse bad guys. Your actual network from your ISP is compromised
> and you get compromised data. Period.
>
> 3. The worst bad guys. The ones you have no protection against under any
> circumstances. These are the people who have physical access to your
> computer. The manufacturers. They can install compromised chips to the
> motherboard, etc.

Note that all of these consequences are detectable. But to get there
you need competent people who are making an effort.

Also, some of the techniques (e.g. print out a copy and at some later
date proofread against it) are really simple.

Meanwhile, one of the biggest risk factors, for any nation state, is
winding up with an incompetent population which can't do anything
useful. So you should expect that to be able to find some support for
that whole "competent people who are making an effort" thing.

But, also: nothing can every be perfect (or, if it is, entropy kind of
assures that that will be temporary). And you can't solve "people" -
only the issues they create.

Anyways... in the context of computer system design: one of the most
important aspects of a good design is that it is going to also involve
issues from "outside the field".

-- 
Raul

Reply via email to