tag:blogger.com,1999:blog-24586388.post4462141036719440454..comments2023-11-24T09:52:43.963+01:00Comments on The Invisible Things Lab's blog: PrioritiesJoanna Rutkowskahttp://www.blogger.com/profile/07657268181166351141noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-24586388.post-44833574223937555162010-01-19T10:14:33.546+01:002010-01-19T10:14:33.546+01:00I totaly agree with you. If your desktop is not se...I totaly agree with you. If your desktop is not secure there is no security at all. At the same time, even if you would realy have a secure desktop, if the rest is insecure the benifits are marginal.<br /><br />@meguxx:<br />I don't belive cloud computing will bring any benifits for securing your data. Like joanna said, you have to trust the service provider. Even worse after you trust the service provider you have to belive that the admins working there have the knowledge to secure their servers, have enough money to build secure systems and last but not least have enough time to take care of their system.<br /><br /><br />July 30, 2010Unknownhttps://www.blogger.com/profile/16563390506898640123noreply@blogger.comtag:blogger.com,1999:blog-24586388.post-5624852436354440052010-01-17T01:02:51.751+01:002010-01-17T01:02:51.751+01:00@meguxx: Could computing doesn't really change...@meguxx: Could computing doesn't really change anything -- you still need to trust your desktop (or smartphone, or whatever terminal you're using). At the very least the attacker that compromised the terminal has full access to all the input (mouse/keyboard) and output (graphics) and can not only sniff it, but also manipulate at will.<br /><br />And, BTW, cloud computing means that you're sharing your private data with others (=the service provider). So, no more private love letters, no more private naked holiday pictures, etc. Think twice before taking the blue pill ;)Joanna Rutkowskahttps://www.blogger.com/profile/07657268181166351141noreply@blogger.comtag:blogger.com,1999:blog-24586388.post-15649742520159613702010-01-16T22:33:02.677+01:002010-01-16T22:33:02.677+01:00what do you think about cloud computing? Whether i...what do you think about cloud computing? Whether it is necessary to create some new security system with new concepts? for example - http://www.onlive.com . this is "games on demand" service. but what if it wiil be not games. what if it will be bussines applications or service that replaced home computer? it use only network. all calculating made by servers. all what you will send to server its signals from mouse or keyboard. with this situation what we should think? all problems with vulnerabilities lie down on shoulders of servers system administrators? do you think this concept of safe clouds can will be created or not?<br /><br />p.s. sorry for my englishMeguxxhttps://www.blogger.com/profile/11637141533779104953noreply@blogger.comtag:blogger.com,1999:blog-24586388.post-59504879625508715712010-01-16T18:32:45.181+01:002010-01-16T18:32:45.181+01:00damnit... my brain is vulnerable too. where can w...damnit... my brain is vulnerable too. where can we get the patch? :)thornmakerhttp://p42.usnoreply@blogger.comtag:blogger.com,1999:blog-24586388.post-64854082021897636092010-01-16T17:58:17.518+01:002010-01-16T17:58:17.518+01:00The "random hex digits" is a proof-of-co...The "random hex digits" is a proof-of-concept exploit that targets a vulnerability in the reader's brain related to processing of the "<please ignore>" tags. Included is a simple "connect back" shellcode that, when executed, causes the victim to connect to the blogger.com server and post a comment. Use it at your own risk or patch your brain.Joanna Rutkowskahttps://www.blogger.com/profile/07657268181166351141noreply@blogger.comtag:blogger.com,1999:blog-24586388.post-9810231108288340262010-01-16T17:39:45.529+01:002010-01-16T17:39:45.529+01:00And you're posting random hex digits why ?And you're posting random hex digits why ?Tom Chivertonhttps://www.blogger.com/profile/04714661810023544820noreply@blogger.com