Global Feed Post Login
Replying to Avatar ₿rMoon

Immutable Laws of Security

Law #1: If a bad actor can persuade you to run their program on your computer, it's not solely your computer anymore.

Law #2: If a bad actor can alter the operating system on your computer, it's not your computer anymore.

Law #3: If a bad actor has unrestricted physical access to your computer, it's not your computer anymore.

Law #4: If you allow a bad actor to run active content in your website, it's not your website anymore.

Law #5: Weak passwords trump strong security.

Law #6: A computer is only as secure as the administrator is trustworthy.

Law #7: Encrypted data is only as secure as its decryption key.

Law #8: An out-of-date antimalware scanner is only marginally better than no scanner at all.

Law #9: Absolute anonymity isn't practically achievable, online or offline.

Law #10: Technology isn't a panacea.

Avatar
⚡️🌱🌙 2y ago

What if your computer doesn’t exist and is just a USB cable with half a boot loader hidden in it?

Reply to this note

Please Login to reply.

Discussion

No replies yet.