Welcome! These forums will be deactivated by the end of this year. The conversation continues in a new morph over on Discord! Please join us there for a more active conversation and the occasional opportunity to ask developers questions directly! Go to the PS+ Discord Server.

Security

19 posts / 0 new
Last post
Treebore Treebore's picture
Security
I am reading all the security stuff, how effective the AI's work,all the various scanning methods, surveillance, etc... So what I am trying to figure out is how exactly are we supposed to do missions without being identified? Or sneak illegal materials into areas where we need them? With all the swarm bots, sniffers, scanners, analyzers, AI security, etc... just how are we supposed to passively bypass them? Plus jammers are written up to be the cure all for aggressively blocking all detection, but they shouldn't be. So any security breaching experts around here? You have a new student.
twntysdr twntysdr's picture
Re: Security
1. The more information you gather, the harder it is to find out what is really important in time for it to be useful. It's the needle in a haystack problem. This is already a problem in our world where we have tons and tons of security information but no way to effeicently analyze it and put the pieces together. It's easy to look back after the fact and say that the people in charge should have put 2 and 2 together, but it's not so clear in the moment when the right answers and their consequences are staring you in the face. Example: A cop has a murder case. He has 500 leads on possible suspects. How long is that going to take for him to find the right one? Is that enough time for the bad guy to get away? 2. The more offenses a crime-fighting entity is able to observe, the more they have to decide what they will and will not enforce and to what degree they will enforce it. Many times, a strict law with sufficient enforcement just has to be ignored or downplayed because of the realities of the cultural behavior. Example: Technically, speeding on the highway is illegal, but everyone does it. If the speed limit is 60 and the traffic on a six lane highway is going 70, catching all of the offenders is out of the question. Yes, you did the offense, but will you be stopped for it? Probably not. The cop will pull over the worst offenders. So even though the law says 60, the practical enforcement looks more like 80. So everyone knows it is pretty safe to drive 72. 3. The more moving parts something has, the more chances to fail there are. Maybe you can't sneak something in unnoticed, but you can bribe or corrupt the system so that you are not reported. Maybe you pay extra and your equipment just doesn't get scanned on the way in. Maybe you pay extra and the alert is recorded as a false positive and you go on your way. Maybe you have a hacker in your group that manipulates the security AI so that it "ignores" you. Maybe you flip a maintenance guy in the station and he leaves a hatch open for you to bring your stuff into the habitat through the back door instead of the port authority. Example: In some neighborhoods, there are tons of witnesses to crimes and yet the police never get any leads. When they do get leads, no one is willing to testify. They know that actions have consequences. Sometimes the real problem is not being observed doing illegal acts, its when you get reported for them.
"Any mental activity is easy if it need not take reality into account." -Marcel Proust "Two things are infinite: the universe and human stupidity... and I'm not sure about the the universe." -Albert Einstien
Treebore Treebore's picture
Re: Security
I see the main problem being the AI security. They are pervasive in the EP setting, they are ever vigilant and thoroughly diligent. Plus surveillance of several kinds, from video to swarm bots that "mark" you, is pretty much everywhere. At critical choke pints they can have any number of effective scanners to detect pretty much detect anything. So how the heck do you negate all of that?
twntysdr twntysdr's picture
Re: Security
As I understand it, the world of Eclipse Phase does not trust AIs. It was unchecked AI development and control that almost erradicated the human race less than a decade ago. I imagine that the world of Eclipse Phase is one where AIs do many tasks but are always limited and harshly supervised by human handlers. The human element of a security system is always it's weak point. Yes, the AIs see you and flag you, but they have to report to someone. Do you know that someone? What kind of favors does that someone owe you? Think of an AI sniffer as a drug dog. The drug dog has a handler. The AI has a handler. The more powerful an AI would be the more tightly limited it would be by human supervision. The handler has a great deal of control over what the actual investigative tool does and what constitutes "an alert". Maybe in this setting it is futile to blind the security elements, but it may be possible to get them to look elsewhere at the critical moment.
"Any mental activity is easy if it need not take reality into account." -Marcel Proust "Two things are infinite: the universe and human stupidity... and I'm not sure about the the universe." -Albert Einstien
Treebore Treebore's picture
Re: Security
They do not trust full AI's, which is why they are now programmed with very narrow functions and other fail safes. So the AI's read like they are very well programmed for what their function is, but not much outside of that. So within their job programming they do whatever they are programmed to do. Reading the security chapter sure seems to make it sound like it would be nearly impossible to pull of something without being at least identified.
twntysdr twntysdr's picture
Re: Security
The security section of the book confirms my assertion that AI survellence is not the backbone of most security. Security and survellence falls chiefly to humans, animals, and infomorphs. They are the ones watching all the feeds and reports and the ones remotely controlling most of the security. Those people can be compromised. Almost all of the security section equipment has limitations and flaws that can be exploited by covert specialists. Ultimately, most of these security measures must perform against infiltration tests. An AI security camera is just not going to see everything if the target is good enough. In my own experience, hackers absolutely own basic security measures once they gain access to the network. I have done some work in the physical security field. There is a constant balance between security, safety, and convenience. In theory, you can make security super tight, but you have to sacrifice safety or convenience in order to do it (sometimes both). A super tight security system results in constant false alarms and wasted effort. Security also costs time and resources which are never limitless. COULD a secruity system be impossible to get into? Maybe... but it almost never is. There are always flaws, backdoors, and weak points.
"Any mental activity is easy if it need not take reality into account." -Marcel Proust "Two things are infinite: the universe and human stupidity... and I'm not sure about the the universe." -Albert Einstien
Treebore Treebore's picture
Re: Security
"Surveillance is more effective than in pre-fall societies because AIs with near human faculties of pattern recognition and indentured infomorphs can be employed to monitor surveillance data." -Page 291 It then goes on to say how the huge pool of infomorph labor means someone is always on duty either as part of the surveillance system or in a robotic shell. So between the AI's unflaggingly watching the monitoring systems and the infomorph's ability to communicate with the AI's very little is going to be missed. Now I am sure there are ways to by pass all of this, there has to be. I suppose it can just be kept as abstract rolls and not really worry about how it is all actually done, but I would prefer to know examples of possible ways it could actually be done.
twntysdr twntysdr's picture
Re: Security
All I'm saying is that, if I was an indentured infolife security guy, and someone offered to buy out my slave contract and sleeve me in a free case if I looked the other way on Tuesday between 1800 and 1835, I would be sorely tempted to not be as vigilant as I normally am. The stealth technology in the book goes a long way to make it a fair fight against security measures. You can't see what is invisible. So right out of the gate, I would tell you that a guy in the EP version of the Predator Suit is going to get pretty far against most security measures. Other spectrums of detection have their weaknesses. Thermal would not effect a morph that was properly regulating temperatures as an example. I think there is an actual infiltration morph if memory serves. There is also a morph in Sunward that can change its facial appearance regularly. Security has alot going for them, but so does the spy. The nanobot tags that cling to you and transmit your location can be detected and neutralized with equipment in the book. With survellance being as heavy as it is, I'd imagine alot of the skill in not being noticed is actually more like hiding in plain sight and not sticking out. If you are just another one of the faceless masses in the crowd, I'd imagine you can get away with alot. The weapon detection equipment can be avoided through palming and misdirection using the palming and infiltration skills. According to the rules and explination, the users can overcome the scans through slight of hand and clever tricks. Another tactic would be the good old system crash. Even a mediocre hacker can get in and crash a security system. I could see crowded checkpoints resorting to pat downs and basic 21st century security checks when their equipment is on the fritz but they just can't close down while it is offline. I think alot of these things would be situation specific. Not every counter-measure would always work. I'm sure some security would be so tight that it would be stupid to try to subvert it, but there is always a way. The fact that Firewall exists at all is proof that survellience isn't foolproof.
"Any mental activity is easy if it need not take reality into account." -Marcel Proust "Two things are infinite: the universe and human stupidity... and I'm not sure about the the universe." -Albert Einstien
nezumi.hebereke nezumi.hebereke's picture
Re: Security
Two notes here... 1) As someone who just spent the past month writing a macro for what our scanner is supposed to do on its own, I can assure you, just because a tool is there doesn't mean it's being used right or will detect what it's supposed to detect. When I cannot even open the file in excel because it has over 150,000 lines of stuff, that means that 90% of it will be ignored. That 90% happens to correspond to #2... 2) You look where the light is. Security is, almost by definition, a game of catch-up. I can only search for a threat that I know of, am expecting, and can detect. So if you're trying to sneak in, break one of those three rules: a. create a threat no one has seen before. Trying to drug someone, but they have chemical sniffers in their room? Design a new chemical which doesn't appear on their definitions list. b. They have detectors on all of the doors and external walls, plus cameras in all the walkways. Get a morph which disassembles into tiny critters and sneak through the tiny access hatches, or pipes for the wires to run through. c. They do a chemical check when you enter the habitat. However, they can't search every centimeter of you for chemicals. Install an artificial vein in the leg which contains your neurotoxin, but doesn't feed into your bloodstream. Without a human going through, centimeter by centimeter, it won't ever turn up as unusual on any scan, and you won't test positive for any chemical sniffers. The cost of detecting it is too high for any but the most rigorous habitats to enact it.
Treebore Treebore's picture
Re: Security
I guess. I know you guys are putting "real life" explanations to this, but we are not talking real life here. With AI's being a full blown reality, not to mention having every aspect of our brains recorded into a database and being able to "resleeve", the level of technology far outstrips what we currently do today, including how effective or ineffective the coding is. Computer coding has obviously advanced in leaps and bounds since it supposedly is capable of "recording" human brains with a very high degree of accuracy, and do it in a way where we presumably stay "human". So like I said before, I am sure there are ways to by pass all of this stuff, but it surely isn't as simple as you suggest. The weakness' of today will no longer be a weakness in EP, but it should have new kinds of weakness', the question is what would they be. I guess since there is no way for us to even really know we simply must default to the known weakness' of todays security. Bummer.
CodeBreaker CodeBreaker's picture
Re: Security
The technology might of improved, but the primary weakness of today’s security remains the primary weakness of the futures. The human element. People are lazy, they get bored very easily and they tend to gloss over subtle patterns. Sure, AI will help alleviate this, but AI is expensive, untrustworthy (10 years ago they tried to kill everyone, and almost managed it) and they tend to be fairly limited in their scope. Also, a hacker can make them dance like a puppet master. And so the way you break into places is you break into the people. You bribe, convince or straight out threaten people. You make extremely heavy use of real time hacking and filtering techniques to hide yourself from the security teams technology. Any team who wants to get into somewhere they are not supposed to be [i]must[/i] have a skilled hacker on their payroll or they are screwed. And because basically everything is mesh controlled in Eclipse Phase if a hacker does manage to sneak his way into a system he has free range over the entire system. Cameras don't record certain people, doors do not log entry codes and sniffer nano begins to tell its owners that it is currently located on the far side of Proxima Centauri.
-
nezumi.hebereke nezumi.hebereke's picture
Re: Security
My comments are based on the mathematical limitations of the data, and the normal limitations of the creators. The creators will not think to test things they do not think to test. The only work around is to get a different creator - but AIs are designed by people and, at best, will likely only think of the things defined by their creators. You do get the benefit of a few 'universal' codes of security checks available, but we have that right now in the form of NIST and ISO documents, and people still mess it up. Creativity is always going to be one of your most useful tools. People will not institute measures which are too expensive (due to cost-benefit analysis, or because of normal sloth) to implement. This too will not change. The technology reduces the price of some vulnerabilities, but increases the price of others. I can't think of how this rule will change. The question of data is also still one of mathematics. The amount of data we're processing has gone up geometrically. A human simply cannot read all of the data provided by his tools. It's just not cost-effective. While AIs and time-compression will increase our relative speed, up to sixty times the current rate, the nature of our tools mean that we are likely looking at up to an increase of 2^50th in quantity of data provided. Data processing and gathering is moving at an exponential rate. It has been since the first transistors, and that rate apparently does not change with EP. The only way you can reduce your data to a manageable level is by applying rules to eliminate all of the cases that you're 99% sure don't apply. That means something gets swept under the rug. Really what you're looking for though is, try as much as possible to be a fringe case. The further you are from established, traditional threats, the less likely you are to be noticed, or effectively stopped. The flip side of that is, the tried and true threat-vectors are still threats because they're effective - and using them with sufficient force and preparation is still a valid option.
nezumi.hebereke nezumi.hebereke's picture
Re: Security
Some handy tools for those Firewall agents on the run... Poopa The poopa is a bio-engineered, insectoid cyborg. In its original form, it is approximately the size and consistency of a pomegranate seed. In this form, it is extremely resistant to radiation, vacuum and cold, and is stable for up to sixteen months. When exposed to the hot, acidic and nutrient-rich environment of the gut of an animal, it begins rapidly growing into its adult form. Different varieties of the poopa are designed to remain in the gut for 24 hours up to a week before being naturally passed out. In their adult form, they are akin to a small, long-legged cricket. Poopa are excellent jumpers and capable of squeezing into tiny spaces, making them ideal for low-gravity environments. The poopa is equipped with a small cyberbrain, which the user programs to the needs of the mission prior to deployment. Poopa Cog 1 Coo 5 Int 10 Ref 5 Sav 5 Som 5 Wil 1 Init 40 Spd 1 Dur 5 WT 1 Luc 10 TT 1 Fray 20, Free Fall 20, Infiltration 60, Perception 20 Equipment: Cyberbrain, Micro-radio Cost: Expensive False Veins The morph is modified to add an additional vein, usually in the upper thigh, which tapers off at either end. The vein has several clusters of muscle to simulate blood movement and is coated with a non-porous polymer. The vein serves as discrete storage for a liquid chemical, which may later be retrieved via hypodermic needle. The vein appears in every way natural, and can only be detected by a trained medical specialist, or a dedicated test such as an angiogram. Under a normal physical examination (including internal imaging), false veins require a successful Medicine test in a field appropriate to the morph, with a -30 modifier to discover. Cost: Moderate Positronic Shunt A positronic shunt is manually wired into the base of a cyberbrain. Once connected, the ego is unable to engage in any physical actions or operate any installed hardware, but is still conscious. Additionally, a remote user may jam the shunted morph as though it were a vehicle. A positronic shunt includes a device approximately the size of an orange which must be attached to the brain, and a pair of injections of specialized nanomachines. The process takes approximately 20 minutes (not counting time necessary to gain access to the brain), and requires a Hardware:Robotics test with a -30 modifier (an additional +20 modifier applies if the shunt was calibrated to the cyberbrain model prior to installation). Cost: Moderate Malligan Tool A malligan tool is a cord of braided borazine nanotubes. It is normally a hair-thin, semi-rigid wire, four to eight feet long. It can be molded to fit around corners. When an electrical current is applied, the cord shortens in length and grows in diameter. When properly inserted, it is strong enough to bend steal, and can pop doors off their hinges in a matter of minutes. When properly inserted, it adds a +40 to strength checks to expand holes or cause structural damage. Cost: Low
randombugger randombugger's picture
Re: Security
Hell you don't even need that. Skin Pocket: The morph has a pocket within its skin layer, capable of holding and providing concealment (+30) for small items. [Trivial] Skinflex: This disguise implant allows the user to restructure their facial features and musculature and alter skin tone and hair color. The entire process takes a mere 20 minutes. Skin ex adds +30 to Disguise Tests. [Moderate] For the synths: Hidden Compartment: The shell has a concealed aperture for a shielded interior compartment, ideal for storing valuables or smuggling contraband. Apply a –30 modifier to detect this compartment either manually or with sensor scans. [Low] Shape Adjusting: This shell is made from smart materials that allow it to alter its shape, altering its height, width, circumference, and external features, while retaining the same mass. This modification is typically employed to reshape the morph into special configurations adapted to specific tasks (for example, lengthening to crawl through a tunnel, widening its base for stability, expanding to reach out and attach to multiple access point simultaneously, and so on). This mod also allows the morph to change its features for disguise purposes; apply a +30 modifier to Disguise Tests. [High] Some gear: Chameleon Cloak: This loose, poncho-like cloak contains a network of sensors that perceive wavelengths from microwave to ultra-violet. A similar network of miniature emitters precisely replicate the information its sensors receive, making the wearer seem transparent to those wavelengths. A chameleon cloak allows a character to effectively become invisible as long as they are stationary or not moving faster than a slow walk. When worn by someone moving faster, the cloak still provides a +30 modifier to Infiltration Tests to avoid being seen or noticed. Chameleon cloaks are not effective against radar, x-ray, or gamma-ray sensors. They do hide the character from thermal infrared, however, by absorbing the character’s body heat into its heat sink. The cloak can only absorb a character’s body heat for one hour before it must emit this heat. Heat emission also requires one hour, during which time the character is easily visible in the thermal infrared spectrum. [Low] Dazzler: The dazzler is a tiny laser system set on a rotating ball. When activated, it consistently spins and emits laser pulses in all directions. These laser pulses are not dangerous, but they detect the lenses of camera systems (including specs, viewers, and bot/ synthmorph sensors) and repeatedly zap them with laser pulses of varying strength to overload and dazzle them. For as long as a dazzler is active, any camera system (visual, infrared, and ultraviolet) within line of sight and within 200 meters is blinded. [Moderate] Invisibility Cloak: This cloak is made of metamaterials with a negative refractive index, so that light actually bends around it, making it and anything it covers invisible. This invisibility works from the microwave to ultraviolet spectrums, but not against radar or x-rays. The drawback is that anything concealed within the cloak can’t see out. This is easily overcome by using external sensor feeds (if available) and entoptics to navigate. Alternately, a small piece of anti-cloak, which cancels the cloak’s invisibility properties when touched together, can be used to create a small window to peep out of, though this increases the chance of being spotted. Noticing such a window requires a Perception Test with a –30 modifier. [High] What their up against: Security AI: Security AIs provide overwatch for electronic systems. Skills: Hardware: Electronics 30, Infosec 40, Interface 40, Professional: Security Systems 80, Programming 40, Research 20, Perception 30, plus one weapon skill at 40. [High]
The Doctor The Doctor's picture
Re: Security
twntysdr wrote:
In my own experience, hackers absolutely own basic security measures once they gain access to the network.
I will second this. There are always machines running services that they are not supposed to, missing patches, one machine has a disabled AV instance...
twntysdr wrote:
I have done some work in the physical security field. There is a constant balance between security, safety, and convenience. In theory, you can make security super tight, but you have to sacrifice safety or convenience in order to do it (sometimes both). A super tight security system results in constant false alarms and wasted effort. Security also costs time and resources which are never limitless.
Do not forget people monitoring them. Once in a while you get a bad sensor install that trips twice a day. Eventually the guards start ignoring it. Or maybe a bad camera trains them to ignore the good replacement's feed because they make bad assumptions. Or someone has their badge exposed when they go to lunch and someone photographs it and loads it into photoshop...
twntysdr wrote:
COULD a secruity system be impossible to get into? Maybe... but it almost never is. There are always flaws, backdoors, and weak points.
And things people never considered. Take the example of retinal scanners used to control access to secure facilities: they sound like a great idea but then someone on staff gets pregnant, does not realize it, and gets stuck in the mantrap because it no longer recognizes that person. After that happens three or four times (or twice to someone high in the food chain), procedures are relaxed in a hurry.
Arenamontanus Arenamontanus's picture
Re: Security
Some other security/spy gear: Love doll An inflatable decoy person. The decoy is a capsule that, when triggered inflates into a fairly realistic-looking human, covered with a chameleon surface that can take on the right clothing an appearance. Simple movement programs allow it to walk, stand or move as if it was real. It will rapidly heat up to body temperature. Up close nobody will be fooled (or in t-rays, ultrasound or radar), but at a distance or in bad viewing conditions the decoy can be useful. Can be used to distract, leave a warm body in a bed, appear to have extra soldiers or send ahead into traps. [Low] Kidnap patch A skin patch that blocks electronic transmissions like a jammer bullet, injects a strong sedative (or Oxytocin-A) and nanomachines that tries to disable Muse control over all implants (Each turn they attempt a resisted Infosec 60 attack against the muse, and if they win they disable muse control). Kidnap "deluxe" also contains nanomachines that builds a crude puppet sock interface to the brain (takes about 30 minutes to form), allowing the kidnapper to take control over the morph. Safe blueprints Agents often need to get equipment in the field inside controlled environments like the Planetary Consortium, where all matter fabrication is heavily controlled. Government agents may have access to blueprints for restricted products, but they can usually only be used on special fabricators. "Safe blueprints" are apparently innocuous designs that get around limitations on building restricted items in public fabbers. Some merely have fake authentication, making the fabricator ignore that it is actually building a restricted object. Others are "art" that hides components that can be assembled into restricted structures. [Cost: one level higher than normal blueprints] Exploit rug A complex wall rug/artwork with endless detail, looking like a textile 3D Mandelbrot set - visually fascinating or annoying, but very hard to focus on or study due to its enormous amount of detail. It actually hides a network of nanocomputers, sensors and phased array antennas that allow it to act as a powerful security/espionage server. It is capable of scanning the environment for transmissions and activity (including heartbet and personal electromagnetic fields), sniffing, jamming both radio, t-rays, sound and vision (in the last form it acts as a dazzler) and in some versions psi. The antenna array also allows it to focus ultrasound, radio or microwaves within the vicinity with high precision, acting as a microwave agonizer, bug zapper and point-to-point communication system. Usually it houses a well-equipped hacker infomorph with at least a Khaos AI or Security AI as help. Exploit rugs are both a way of smuggling in equipment (since it is hard to detect the full capabilities of the "artwork") and a discreet safety measure for offices or meeting rooms. [Expensive] (Borrowed from Scott Westerfeldt's "Evolution's Darling")
Extropian
OneTrikPony OneTrikPony's picture
Re: Security
Arenamontanus i swear I'm not stalking you. You just happen to say alot of stuff that has a close tangent to the efforts of my own skull sweat. [quote]Safe blueprints Agents often need to get equipment in the field inside controlled environments like the Planetary Consortium, where all matter fabrication is heavily controlled. Government agents may have access to blueprints for restricted products, but they can usually only be used on special fabricators. "Safe blueprints" are apparently innocuous designs that get around limitations on building restricted items in public fabbers. Some merely have fake authentication, making the fabricator ignore that it is actually building a restricted object. Others are "art" that hides components that can be assembled into restricted structures. [Cost: one level higher than normal blueprints] Since my group will be playing on Luna I've been thinking a bit about fabber security. How do the restriction protocalls work and how secure are they? My theory at this point is that to have any effective restriction measures on fabbers requires a Device AI (p.331) and it is VERY effective. Look at any of the simple AI and you'll see that they all can have a knowledge skill rated at 80 meaning that those AI have one skill "Worthy of being a system renowned authority on the subject" (p. 174) Given the complexity of a fabber's job I'm certain that it is run by an AI. I think that a Fabber AI has the skills; Programing(nanotechnology) 30, and Accademics:Nanotechnology[Restricted nano] 80[90]. The device won't work without a working AI and subverting the AI would require two -30 subversion tests to; "override safety cutoffs", and "Disable Allerts" otherwise the AI won't make the nanite needed to fabricate your restricted gear. (I know hackers will want to argue that hacking a device is so simple you can do it in two combat turns please post that in a separate thread.) My point is that I think it's very difficult to 'fool' the AI into fabbing what you want because the AI is actually very smart. It could be even more difficult if the Fabber is opperated by an info morph and you can be certain that an Infomorph indenture or security AI is monitoring the system at least. However, in support of Arenamontanus' idea I think there is a code used to unlock any Fabber, two actually. OZMA has one and Oversight has one. All fabbers manufactured by PC corps are automatically programed to unlock for any blueprint that carries the Oversight code. (Kinda like how AT&T and Yahoo will open their whore legs for NSA when ever it gets a hardon.) And pertaining to the OP's questions, I'd like to talk about other ways that OZMA and Oversight (SW p.150) deal with subverting security. Because you know they do that frequently.

Mea Culpa: My mode of speech can make others feel uninvited to argue or participate. This is the EXACT opposite of what I intend when I post.

The Doctor The Doctor's picture
Re: Security
OneTrikPony wrote:
However, in support of Arenamontanus' idea I think there is a code used to unlock any Fabber, two actually. OZMA has one and Oversight has one. All fabbers manufactured by PC corps are automatically programed to unlock for any blueprint that carries the Oversight code. (Kinda like how AT&T and Yahoo will open their whore legs for NSA when ever it gets a hardon.)
A concern regarding such a measure would be that Autonomist hackers reverse engineering the firmware of fabbers would discover those authorization codes and disseminate them, thus causing restrictions on the technology to backfire as word got out. A method that would be less likely to get out would be OZMA or Oversight partnering with a small number of firms that manufacture fabbers to make them put complexes of bugdoors (deliberately implanted vulnerabilities) into the firmware. A deliberate pattern of exploitation of the right vulnerabilities would result in unlocking the fabber for a certain period of time. While vulnerabilities are routinely found and exploited, it is less likely that someone would detect an implicit process involving multiple bugs. To put it another way, consider all of the tiny mistakes and misalignments that arise during the design and construction of a keylock that, when taken into account and applied in a particular sequence allows someone with a filed down bit of spring steel to pick a lock.
root root's picture
Re: Security
root@Security [hr] Assuming electricity is still used to bear signals, a well placed dust cloud can perform a Tempest hack without ever having to touch the systems if improper Faraday caging is used. The other gaping weak point for security are muses. Muses probably handle all of someones passwords, and muse-hacking is a hell of a lot easier than trying to hack the ICed-to-the-logic-gates security system containing corporate records. And, of course, the worlds best solution to massive computer security is lead-pipe cryptanalysis.
[ @-rep +1 | c-rep +1 | g-rep +1 | r-rep +1 ]