• 2 Posts
  • 137 Comments
Joined 2 years ago
cake
Cake day: June 21st, 2024

help-circle







    • Why is the IT guy trusted with access to sensitive data after handing in his notice?
    • Why does he have access to data that is probably not related to his job?
    • Is access to the database monitored? It should trigger an alert if an employee accesses lots of data.
    • Apparently, he successfully bypassed the DLP (Data Loss Protection) systems in place by using optical media.

    And lastly, insider threats like this are really not easy to mitigate. You said that in this example it was an IT guy. There are lots of different ways to export data from a system when you have privileged access to servers.







  • If you want “mass surveillance” with thousands of suspects, millions of requests per subject (the paper mentions 20 requests per second IIRC), over weeks … you probably get blocked and/or caught.

    Also, your suspects will be “significantly unhappy” if your espionage costs them 11-18% of their battery per hour. Even without other usage, the battery would be dead by noon.

    And lastly, this attack uses so much bandwidth that video streaming is impacted. I would guess that it probably needs about 1 MBit, which is 11 GB per 24 hours.






  • The maintainers of the big web browsers have pretty strict rules for CAs in this list. If any one of them gets caught issuing only one certificate maliciously, they are out of business.

    And all CAs are required to publish each certificate in multiple public, cryptographically signed ledgers.

    Sure, there is a history of CAs issuing certificates to people that shouldn’t have them (e.g. for espionage), but that is almost impossible now.