8 Matching Annotations
- May 2020
-
www.digital-democracy.org www.digital-democracy.org
-
By putting our data in the corporate cloud, we are that kid. We are giving corporations and governments a way to see where we are looking towards, and they can predict our future and decide whether and how to intervene or subvert.
-
From a game theoretic standpoint, we’ve already lost. Too many of our civil society adversaries have too much of our data, and we have so little of theirs.
-
- Apr 2020
-
gavinmiller.io gavinmiller.io
-
You see entropy is information leaking. When it comes to passwords (and secure systems in general) you want to leak as little information as possible. Otherwise an attacker has information they can use to their advantage.
-
-
www.csoonline.com www.csoonline.com
-
Download the billions of breached passwords and blacklist them all. Attackers have a copy; so should you.
-
-
blog.1password.com blog.1password.com
-
This isn’t the first time Kerckhoffs’ Principle has come up. I specifically discussed it when talking about creating good, strong Master Passwords, when I said that we should use a system for coming up with Master Passwords that doesn’t lose its strength if the attacker knows the system that we used
-
Kerckhoffs’ Principle states that you should assume that your adversary knows as much about the system you use as you do. This is why – despite what I may have said on April Fools Day last year – security experts are skeptical of security systems that hide the details of how they operate. They are particularly skeptical of systems that derive their security from keeping the details of how they work secret. I could go on at great length about why openness about the system improves security. Indeed, my first draft of this article did go on at great length.
-
-
en.wikipedia.org en.wikipedia.org
-
"the enemy knows the system"
-
"one ought to design systems under the assumption that the enemy will immediately gain full familiarity with them"
-