All the assurances and the yada yada about how many layers of protection to protect accesss to the data are only as good as the programs that protect the NSAs Illegal treasure trove of Blackmail.
So if the NSAs Nazi programmers wrote hacks to get around these protections, how would the pointy haired managers (aka Dilbert's) know?
Open Source the inquiry programs and audit programs to see how well (or badly) they have been written to protect private information.
The public and hackers cannot get to the data base because it is supposed to be secure and accessible only with special terminals.
Questions like: Is John Doe always a valid audit entry?
How is the audit data stored?
Who can access the data without creating an audit entry?
So if the NSAs Nazi programmers wrote hacks to get around these protections, how would the pointy haired managers (aka Dilbert's) know?
Open Source the inquiry programs and audit programs to see how well (or badly) they have been written to protect private information.
The public and hackers cannot get to the data base because it is supposed to be secure and accessible only with special terminals.
Questions like: Is John Doe always a valid audit entry?
How is the audit data stored?
Who can access the data without creating an audit entry?
via JREF Forum http://forums.randi.org/showthread.php?t=263528&goto=newpost
Aucun commentaire:
Enregistrer un commentaire