Deutsch English Français Italiano |
<SISdnRicAKGOtYb6nZ2dnZfqnPqdnZ2d@earthlink.com> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!Xl.tags.giganews.com!local-1.nntp.ord.giganews.com!nntp.earthlink.com!news.earthlink.com.POSTED!not-for-mail NNTP-Posting-Date: Fri, 25 Oct 2024 05:09:39 +0000 Subject: Re: Torvalds Slams Theoretical Security Newsgroups: comp.os.linux.advocacy,comp.os.linux.misc References: <pan$26699$6602b79b$4abe425a$df32a923@gnu.rocks> <_OmcnZpYmdE-PYX6nZ2dnZfqn_udnZ2d@earthlink.com> <wwvldyfmenf.fsf@LkoBDZeT.terraraq.uk> From: "186282@ud0s4.net" <186283@ud0s4.net> Organization: wokiesux Date: Fri, 25 Oct 2024 01:09:38 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.13.0 MIME-Version: 1.0 In-Reply-To: <wwvldyfmenf.fsf@LkoBDZeT.terraraq.uk> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Message-ID: <SISdnRicAKGOtYb6nZ2dnZfqnPqdnZ2d@earthlink.com> Lines: 62 X-Usenet-Provider: http://www.giganews.com NNTP-Posting-Host: 99.101.150.97 X-Trace: sv3-82qoEv+/KqMakW1tZeiw0+/EVWAd+nAo6toZ1mYqH7RxABUW68BvUGEA0gKUWixSrh05Q8VQ2rtRvBg!TGPKRs8sacXHmJVq7HoDQDxvb3DqSJl4qTpQ1E95xrxpgngGKlMrQ7IIy7YxjodJCW1+tM/yRQF2!6LUby+EXp0/ResNDB/lN X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly X-Postfilter: 1.3.40 Bytes: 3870 On 10/23/24 4:01 AM, Richard Kettlewell wrote: > "186282@ud0s4.net" <186283@ud0s4.net> writes: >> The problem is State-funded actors these days and the MASSIVE >> computing power they can bring to bear. > > Well, it’s _a_ problem, for people and organizations who are realistic > targets of state actors. But (for example) for most private individuals > the biggest threat is criminals trying to access their bank account or > credit card. > >> At least SOME of those "theoretical" attack vectors CAN become real >> attack vectors. >> >> But WHICH ??? > > The obvious answer is attacks on weak cryptography. RSA-1024 and DH-1024 > are probably breakable by the biggest SIGINT agencies (and anyone else > with comparable compute resources: cloud service providers for example). > > https://weakdh.org/imperfect-forward-secrecy.pdf attempted to analyse > this (among other things) nearly a decade ago, as a concrete example. Um ... even weak crypto takes a lot of CPU time to decode. Direct access to corp computers, where the victim's system is doing all the work, via fake or compromised corp users - I think *that* is the "biggest problem" relative to data theft. A lot of THAT involves "human engineering" - scams that most ordinary workers will never detect despite good 'educational' efforts. Scammers are VERY sneaky. However poor security/auth measures and un-monitored external access also plays a role - corp laziness and/or budget limitations. It's not just *a* problem - but weakness at a number of levels. Vlad's boyz have the time and resources to go after ALL of them - over and over and over - until chinks in the armor are found. Victims generally do NOT have the resources, IQ/$$$, to defend. Oh, and the golden gate to bank accts and industrial control systems and such are all the numbers/data Vlad's boyz steal - the stuff you use to prove you are you. Oh, today's news - another health-care system finally admits to being severely compromised ... 100 MILLION detailed records stolen. Sorry, but everyone needs all-NEW numbers for everything, like TOMORROW. Otherwise when They hit the hit will be TOTAL, so large deep and wide there will be no good fixes. A nuke attack without a single mushroom cloud. This is the world we have (mis)-made. SO - Linus is *partially* correct, but also partially wrong. It's the "wrong" fraction that's so worrisome.