7 Matching Annotations
- Jun 2020
-
signal.org signal.org
-
If easy-to-use software like Signal somehow became inaccessible, the security of millions of Americans (including elected officials and members of the armed forces) would be negatively affected.
Tags
Annotators
URL
-
- May 2020
-
kellysutton.com kellysutton.com
-
This approach decreases the collateral damage that one team’s non-deterministic tests have on other teams.
-
- Apr 2020
-
-
The key change here is the removal of an intent to defraud and replacing it with willfully; it will be illegal to share this information as long as you have any reason to know someone else might use it for unauthorized computer access.It is troublesome to consider the unintended consequences resulting from this small change.
-
The problem is that it is that the laws themselves change the very definition of a criminal and put many innocent professionals at risk.
-
As serious leaks become more common, surely we can expect tougher laws. But these laws are also making it difficult for those of us who wish to improve security by studying actual data. For years we have fought increasingly restrictive laws but the government’s argument has always been that it would only affect criminals.
Tags
- legitimate activities/uses made illegal due to laws intended only to forbid illegitimate activities
- legitimate uses of a feature blocked due to abuse of the same feature
- unintended consequence
- liability
- unfortunate policies/laws
- collateral damage/impact
- don't turn innocent people into criminals (through bad laws)
Annotators
URL
-
-
www.troyhunt.com www.troyhunt.com
-
Another approach I toyed with (very transiently) was blocking entire countries from accessing the API. I was always really hesitant to do this, but when 90% of the API traffic was suddenly coming from a country in West Africa, for example, that was a pretty quick win.
-
-
en.wikipedia.org en.wikipedia.org
-
The term has also been borrowed by the computing community to refer to the refusal of service to legitimate users when administrators take blanket preventative measures against some individuals who are abusing systems. For example, Realtime Blackhole Lists used to combat email spam generally block ranges of Internet Protocol (IP) addresses rather than individual IPs associated with spam, which can deny legitimate users within those ranges the ability to send email to some domains.
-