Attack of the killer iPods
Posted Jun 23, 2005 9:56 UTC (Thu) by ayeomans
In reply to: Attack of the killer iPods
Parent article: Attack of the killer iPods
Simple in Linux maybe. But LWN readers are spoiled, try doing it in Windows!
Personally I prefer a thin client approach, since if the dataset is that valuable, you never want it to appear in its entirety at the client. There are many theft routes, even a passive network sniffer will do the job. Instead, let the application run on the server, providing screen views of only the data that is authorised to be accessed. You can't easily stop the digital camera or photographic memory, so don't provide all the data in the first place. And don't forget the printer or email routes to get the data out.
Again, quite easy in Linux, but rather harder to plug all the holes in Windows.
to post comments)