[Cryptography] The Laws (was the principles) of secure information systems design

Henry Baker hbaker1 at pipeline.com
Wed Jul 13 20:14:41 EDT 2016


At 03:16 PM 7/13/2016, Ray Dillinger wrote:
>"Big Data" -- Whatever people didn't secure.

Too Big to Secure -- e.g., Bluffdale.

>"DRM" -- A technology which gives the key to the attacker.

Digital Rootkit Management

>"Proprietary" -- Unreviewed.

Trade secret that is shared with FBI/DHS/NSA pursuant to an NSL.

>"Trusted" -- Capable of screwing you over.

Backdoor that's been approved by the NSA.

>"Trusted Platform Module" -- "TPM"

Tissue Paper Mansion.




More information about the cryptography mailing list