Tailpipe emmission standards
Tailpipe emmission standards
Posted Dec 3, 2013 17:17 UTC (Tue) by mathstuf (subscriber, #69389)In reply to: Tailpipe emmission standards by rriggs
Parent article: Geer: Trends in cyber security
Posted Dec 3, 2013 17:33 UTC (Tue)
by dlang (guest, #313)
[Link] (5 responses)
If you have to prove that your OS is secure before connecting to the Internet, you cannot develop a new OS, especially as a hobbiest.
The vehicle emissions example is one that is a really good example of how things can go wrong. I live in California, which has the strictest emissions rules around, and there are cars that produce less pollution than cars sold in California that are not allowed to be sold here because they aren't "equipped properly", the manufacturers came up with different solutions to the problems than what the state regulators did.
you really don't want this sort of checklist auditing to be able to control everyone's computers.
Posted Dec 5, 2013 11:54 UTC (Thu)
by nye (subscriber, #51576)
[Link] (4 responses)
Not that this changes your point, but I'm just wondering: do you mean that the regulations specify a particular technology, rather than actually measuring emissions? Or do you mean that they measure a particular set of substances and the cars in question fail on one particular part of the test despite being better overall?
Posted Dec 5, 2013 15:20 UTC (Thu)
by raven667 (subscriber, #5198)
[Link] (3 responses)
Posted Dec 5, 2013 16:53 UTC (Thu)
by mathstuf (subscriber, #69389)
[Link] (2 responses)
And that, IMNSHO, is the (main) problem: legislating solutions rather than results :( .
Posted Dec 5, 2013 20:33 UTC (Thu)
by dlang (guest, #313)
[Link] (1 responses)
and what makes you think that lawyers and politicians are going to do any better of a job legislating how computers should be secured than how to build cars?
that's the real problem with calls to require that only 'qualified' or 'good' people connect to the Internet.
Posted Dec 5, 2013 22:16 UTC (Thu)
by mathstuf (subscriber, #69389)
[Link]
[1]Apparently JP Morgan lost ~465,000 (pre-paid) CC numbers in July and it's only public[2] now because they couldn't "rule out the possibility that some card holders' personal data may have been accessed" instead of being proactive and saying "we've had a breach and your number may have been leaked" in, say, August.
Tailpipe emmission standards
Tailpipe emmission standards
Tailpipe emmission standards
Tailpipe emmission standards
Tailpipe emmission standards
Tailpipe emmission standards
[2]http://arstechnica.com/security/2013/12/hack-on-jpmorgan-...
