ThunderHorse
Verified Military
Oh man, I remember all the gamers in high school trying to tell me I needed to switch my box to linux because fuck microsoft...I still played games and shit, but never made the jump to open source thank god.
Oh man, I remember all the gamers in high school trying to tell me I needed to switch my box to linux because fuck microsoft...I still played games and shit, but never made the jump to open source thank god.
And all of your big phone choices run some flavor of Linux, including Apple.
China broke Blackberry? Seriously...
I still trust Apple servers to be better protected than most though. And thankfully last I knew, they weren't giving up the encryption info to Uncle Sam and other countries.I stand corrected about Apple, it uses a proprietary hybrid version of UNIX with which Apple has modified and placed its own user interface.
That's a pretty bold assumption. Why do you consider them better protected than most?I still trust Apple servers to be better protected than most though. And thankfully last I knew, they weren't giving up the encryption info to Uncle Sam and other countries.
That's a pretty bold assumption. Why do you consider them better protected than most?
Maybe in the physical security portion of things, but I don't know of anyone doing anything particularly earth-shattering as far as technical security is concerned. It's a fairly level field when it comes to who is targeted. Success for someone who breaches security isn't really measured in headlines either, but more of what is done for long periods of time without being discovered. Not handing over encryption codes to DOJ etc might be fine for publicity, but that doesn't mean it hasn't been cracked by other means.Having been to one of their server facilities before and many briefings on all things tech. Plus as a civilian I have appreciated them not handing out the encryption code to DOJ and other law enforcement agencies.
Maybe in the physical security portion of things, but I don't know of anyone doing anything particularly earth-shattering as far as technical security is concerned. It's a fairly level field when it comes to who is targeted. Success for someone who breaches security isn't really measured in headlines either, but more of what is done for long periods of time without being discovered. Not handing over encryption codes to DOJ etc might be fine for publicity, but that doesn't mean it hasn't been cracked by other means.
I guess what I'm saying is that I have doubts any time there's a claim of great protection. It allows people to relax their own security protocols (password management/changes, implementing MFA, basic awareness) because a platform claims better security than the competition. That's been wrong more than it's been right with platforms providing mass services.
Oh, no doubt. I had a business for a while where that was my main focus (physical security pen testing). It's hard to impress upon people the importance of those things, especially when you tell them the cost, lmao. But, it's a fight we have to keep fighting, unfortunately.Everyone is always looking for access, whether it's physical or cyber. Most of the briefings I attended centered around upcoming technologies and how they could be deployed or new vulnerabilities and how to exploit them. Physical security is of equal importance, if not greater, than cyber protection. A lot more damage can be done to a whole network if you have direct physical access and can do as you please.