Ok, My turn to talk about what the internet is referring to as The - TopicsExpress



          

Ok, My turn to talk about what the internet is referring to as The Fappening A huge plethora of images stolen by an individual from the whole of the ICloud. To the Hacker: While I do not agree with your tactics or motives I do respect you for teaching us that we need to ensure our security on the internet by possibly using hardcopies for things we do not want to surface. To the Victims, its not just Jennifer Lawrence, I appreciate the embarrassment you are feeling now, but I can not hold an ounce of pity toward you for a simple reason. This incident is not the first, nor will it be the last. You forgot that several women in the past have had private pictures plastered among the internet for all to see by hackers, then you took pictures of your own with internet connected devices that regularly synch to a cloud based network. People have said What if someone breaks into someones house, is it the homeowners fault? Part of me says No its not their fault for leaving the 70 inch tv box outside by the curb for 6 days till trash day, or for leaving a key under the rock while little timmy comes home early from school and leaves the key slightly visible. Nor is it their fault that someone staked out their house to steal anything they could. But another part of me says They should have practiced security measures like cutting up the box and throwing it away on trash day, or sewing the key to timmys bag so he wont forget it Let me explain Cloud Based Networking for a second. The house metaphor wont work here, because a house is a centralized location with set access points. Think of a campground. That campground is more like the cloud. Lots of entrances and exits, but your tent is generally where the camp manager rents to you. If you wouldnt take it camping with you you probably shouldnt take pictures of it with a cloud backup The Solution!!!! Honestly the first solution to situations like this are to assure the victim that every measure was taken to safeguard the security and promise them that steps at adaptation so this doesnt happen again and make sure those promises are kept. Next is to realize that for every improvement to a secure server there is the possibility of creating a new hole for someone to sneak in through. You cant change the person only the situation. The only real 100% verified solution: Learn from yours and others mistakes. If you can not follow those guidelines you are destined to repeat them.
Posted on: Tue, 02 Sep 2014 19:12:57 +0000

Trending Topics



Recently Viewed Topics




© 2015