On Wed, Apr 13, 2011 at 11:17, Andrew S. Baker <asbz...@gmail.com> wrote:
>>>The takeaway here: Don't use any remote applications in the cloud  for
>>> anything you wouldn't want to see posted on the front page of the NY Times.
> FTFY

I'll accept that fix.

> This is much ado about nothing.

I don't believe as you do.

> If your box is compromised, and you're
> sharing things remotely, then you have more risks than if you weren't.

That's not the risk I am concerned about. I'm concerned about the risk
where you're sharing a Dropbox account with folks whose machines are
not under your control, which, from my understanding, is one of the
major use cases for this service. Putting aside any concerns about the
security of the Dropbox infrastructure (which is a considerable
question of its own), the security model for this is completely
borked.

> Feel free to suggest an authentication mechanism that would withstand the
> initial premise of "your machine is exposed such that your config.db is
> stolen".

My initial premise that your Dropbox is exposed if your config.db is
stolen - not the same thing.

> Several of the comments, particularly those by alec muffett, provide
> valuable information about the risk.
> I'd welcome the ability to see where else systems are logged on to Dropbox,
> but that's about the extent of my concern at this time.

And, given that some influential staff in my org are using Dropbox,
and started doing so without notifying IT, I'm concerned about that
too, and that I don't have a good way to turn their access to it off.

Kurt

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to