tag:blogger.com,1999:blog-37798047.post8275728069375134908..comments2024-01-16T05:48:33.523-05:00Comments on Errata Security: How the FBI might've been owned (12M Apple records)David Maynorhttp://www.blogger.com/profile/09921229607193067441noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-37798047.post-2805291227472727302012-09-05T05:00:26.023-04:002012-09-05T05:00:26.023-04:00@Anonymous 1:03 PM
"Even though computer deg...@Anonymous 1:03 PM<br /><br />"Even though computer degrees are worthless after 4 years things change so fast".<br /><br />Say you learned all it takes to pass a driving license test an were successful at the exam.<br /><br />Next, the signaling scheme is set to change every now and then, by 10% each time.<br /><br />Will your core driving capabilities be void after the first 10% signaling changes ? Certainly not.<br /><br />However, as the years go by with the incremented signaling changes, you will find yourself more and more "crippled" whenever you find yourself in a traffic; if you have never bother learning the new rules; heck you might even crash your car and make victims. <br /><br />In this analogy, as well as for the computer degree and for the matter, for any type of work subject to new framework implementation; the focus is more on the ability of the recognized professional (degree holder) to keep up with the current standards than the piece of paper attesting of his past achievements.Shttps://www.blogger.com/profile/03636644830272271930noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-25870842485470945402012-09-04T17:55:55.324-04:002012-09-04T17:55:55.324-04:00So shouldn't the FBI encrypt it's emails o...So shouldn't the FBI encrypt it's emails or at least only take notice of signed ones?Anonymoushttps://www.blogger.com/profile/10633691117796765797noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-76109533165570516742012-09-04T14:03:47.592-04:002012-09-04T14:03:47.592-04:00Your comment could also be a form of Disinformatio...Your comment could also be a form of Disinformation. Are you in the employ of a Federal Agency or contractor? If they wanted to steel from an iOS developer, they could have an easier time of it and could do it every month for 100's of millions of IDs. I don't think you understand how lax App developers security is. No, this was legit Anon isn't as smart as you credit them in the area of counter information dissemination.<br /><br />There are usjobs.gov ads for government employees that write in Java, even though Java is one of the main reasons Windows has such a bad rep. But the boss probably only knows Java and loves Oracle so wants to keep his job and keeps pushing it. Get rid of it!<br /><br />What type of Security Professional for the FBI, CIA, Homeland, or Defense would even allow Java? What type of Security Professional would allow unencrypted csv files on his desktop? <br /><br />They make dedicated encrypted USB drives for this type work and the drive needs to be unplugged when not in use and stored on person or in a safe. Heck, why doesn't the government just use dumb laptops and force security professionals to remote into a virtual desktop and force agents to use encrypted local USB drives for local files that have a use timeout?<br /><br />Reason? Security's worse enemy is ease of use. You make something too secure and people complain about time it takes to encrypt/decrypt.<br /><br />FBI needs people that don't have college degrees. College destroys creativity and is proven to lower it depending on your degree. Yet you could be smartest out there but they won't hire you without one. Even though computer degrees are worthless after 4 years things change so fast.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-37798047.post-36498897479521033182012-09-04T07:48:49.612-04:002012-09-04T07:48:49.612-04:00So, another theory.
1. Hackers steal userlist fro...So, another theory.<br /><br />1. Hackers steal userlist from one of iOS developers. 1mln+ accounts.<br />- relatively small database (only 1mln revealed, no proof more exists)<br />- database with users all around the world (classic profile for app developer)<br />- fileds in database used on a regular basis by developers<br />2. Hacker attribute this leak to FBI-Apple collaboration:<br />- picks anti-Anonymous FBI agent<br />- picks specific filename (mind the first letters! cooperation between private sector and law enforcement)<br />- picks reliable exploit which was active during a specific timeframe<br />- adds some "reliable" details (Dell Vosotro, exploit name etc)<br />3. Profit.<br /><br />Disinformation can be a powerful weapon, whole internet is speaking about FBI - Apple cooperation.Anonymousnoreply@blogger.com