[Cryptography] The Laws (was the principles) of secure information systems design
Henry Baker
hbaker1 at pipeline.com
Wed Jul 13 20:14:41 EDT 2016
At 03:16 PM 7/13/2016, Ray Dillinger wrote:
>"Big Data" -- Whatever people didn't secure.
Too Big to Secure -- e.g., Bluffdale.
>"DRM" -- A technology which gives the key to the attacker.
Digital Rootkit Management
>"Proprietary" -- Unreviewed.
Trade secret that is shared with FBI/DHS/NSA pursuant to an NSL.
>"Trusted" -- Capable of screwing you over.
Backdoor that's been approved by the NSA.
>"Trusted Platform Module" -- "TPM"
Tissue Paper Mansion.
More information about the cryptography
mailing list