The largest #security breaches over the last year in one graph. #hackingpic.twitter.com/CK1Ir0hDi1
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
@nickszabo4 @peterjmsimons insider problems around 60% of all breaches, in most surveys I've seen
@iang_fc @peterjmsimons Citation / link?
@iang_fc @NickSzabo4 @peterjmsimons The problem isn't always sysadmins, the problem is often devs who need to see what's encrypted.
@wolfoftheair @nickszabo4 @peterjmsimons Need to establish procedure for routine access, dual party; and extraordinary access.
@wolfoftheair @nickszabo4 @peterjmsimons If we had systems where the riles were simple and followed, yes. Where we had consumer buy-in, yes.
@iang_fc @NickSzabo4 @peterjmsimons It'd be a lot easier to get consumer buy-in if they were actually documented and not hidden backdoors.
@wolfoftheair @nickszabo4 @peterjmsimons and you wan't get open doco unless the author wants to consider herself one of the consumers.
@iang_fc @NickSzabo4 @peterjmsimons Until gov't is considered one of the consumers, as well. And until gov't subsidizes some portion of it.
@iang_fc @NickSzabo4 @peterjmsimons Without gov't access, gov't just seizes passwords and keys.
@wolfoftheair @iang_fc @peterjmsimons That makes them go through normal legal procedural channels -- win.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.