Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I wish I could upvote this comment twice.

At this point in 2019 intelligence gathering and government/corporate security vulnerabilities are much more in the digital realm than physical. Wifi enabled cameras/microphones, cell phones, servers, consumer computers, usb devices, iot devices are all used to that end.

We need to hold the flame to OS vendors to handle basic security precautions. It's not like the US government doesn't have contract negotiations with them large enough to force the issue.

It's also unacceptable to have security around the most protected person on the planet be ignorant to common attack vectors and procedures.



It’s largely shortcomings of “modern” OS designs and hardware. Things like kernel-space drivers and dma for peripherals make it very hard to have any reasonable level of protection.


If i were a gov, id have a gov only interface. One that isnt common and available to every person on the planet.


Hasn't the security by obscurity myth been debunked, and furthermore hasn't government proven itself utterly incompetent at designing products?


I'm not sure I would classify it as such, it's more of an attack surface reduction, assuming we're only talking about the physical form factor.


> incompetent at designing products?

You mean like SELinux? Or SE Android? Or the STIGs?


Thats not really what I meant.

I am just saying that they should have a pre usb meter that prevents the usb stick from being attached to a device directly such that they can screen it off ...


Defense in depth has not been debunked.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: