Immutable Laws of Security

Law #1: If a bad actor can persuade you to run their program on your computer, it's not solely your computer anymore.

Law #2: If a bad actor can alter the operating system on your computer, it's not your computer anymore.

Law #3: If a bad actor has unrestricted physical access to your computer, it's not your computer anymore.

Law #4: If you allow a bad actor to run active content in your website, it's not your website anymore.

Law #5: Weak passwords trump strong security.

Law #6: A computer is only as secure as the administrator is trustworthy.

Law #7: Encrypted data is only as secure as its decryption key.

Law #8: An out-of-date antimalware scanner is only marginally better than no scanner at all.

Law #9: Absolute anonymity isn't practically achievable, online or offline.

Law #10: Technology isn't a panacea.

Reply to this note

Please Login to reply.

Discussion

Esp #9 : Lots of you guys putting a LOT of effort into a doomed attempt to maintain privacy re your BTC.

Have fun, but never think you succeeded well enough to "forget" about any tax due. That way lies a harsh reminder about #9 #[0]

What if your computer doesn’t exist and is just a USB cable with half a boot loader hidden in it?