Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Dumb idea anyhow. (Score 1) 174

But now that I have THREE(?) separate cloud providers to run a single application, where is my advantage over just hosting it in my own data center? How many different 3rd parties am I going to pay to touch my confidential data before all of the promised cost-benefits of the cloud disappear?

And if something goes wrong in my 3-headed cloud won't each provider just point at one (or both) of the other two and claim it's their problem?

Comment Re:4th Amendment and progress (Score 1) 174

The problem is that the abstracting ends when and where the government of the country wherein the server exists decides it does. Note the whole China/Google kerfluffle. In the utopian view of the Internet Google and their searches roam freely across the landscape, unencumbered by quaint political systems.

In reality the Chinese government actively restricts (or at least tries to) what passes into and out of their country by land, sea, air and cyberspace. Other countries have intervened on the Internet as well - jailing people for political postings, actively monitoring traffic, even trying to shut down the Internet (in their country) during times of crisis.

Whether we want to believe it or not, the Internet only rises as high as those political entities allow it to and that means that having the protection of the 4th Amendment is still important.

Comment Re:Hosting countries (Score 1) 174

No, and that is exactly what I consider to be one of the biggest issues of the Cloud. The Terms of Service of many, if not most, Cloud Computing/SaaS providers explicitly allow them to outsource their storage (or either primary data or backups or both) to unnamed 3rd parties. Where are these mysterious 3rd parties located?

Like all businesses keeping costs down helps them keep profits up and since Cloud Computing IS largely sold as a low-cost solution (we can discuss price vs. cost later) we know that keeping costs low is imperative. As we know the Internet crosses International borders (most of them anyhow) effortlessly. Is there any reason to think that a Cloud/SaaS provider wouldn't gladly outsource their storage to a cut-rate data center in another country? Maybe even a country that isn't very friendly to the U.S.?

The 4th Amendment means nothing in Malaysia or China or Venezuela or ...you get the idea.
The Courts

The Fourth Amendment and the Cloud 174

CNET has up a blog post examining the question: does the Fourth Amendment apply to data stored in the Cloud? The US constitutional amendment forbidding unreasonable searches and seizures is well settled in regard to the physical world, but its application to electronic communications and computing lags behind. The post's argument outlines a law review article (PDF) from a University of Minnesota law student, David A. Couillard. "Hypothetically, if a briefcase is locked with a combination lock, the government could attempt to guess the combination until the briefcase unlocked; but because the briefcase is opaque, there is still a reasonable expectation of privacy in the unlocked container. In the context of virtual containers in the cloud...encryption is not simply a virtual lock and key; it is virtual opacity. ... [T]he service provider has a copy of the keys to a user's cloud 'storage unit,' much like a landlord or storage locker owner has keys to a tenant's space, a bank has the keys to a safe deposit box, and a postal carrier has the keys to a mailbox. Yet that does not give law enforcement the authority to use those third parties as a means to enter a private space. The same rationale should apply to the cloud." We might wish that the courts interpreted Fourth Amendment rights in this way, but so far they have not.

Comment Luckily... (Score 1) 2

This appears to only affect sites that don't use encryption. Otherwise this would be really scary for companies who are increasingly locating their sensitive and mission-critical data "in the cloud". Who knows what sort of confidential documents, messages or financial info might be inadvertently exposed through this otherwise.

Google Docs, I note...DOESN'T always use encryption. Seems to me that puts them on the list of sites that COULD be vulnerable.

Submission + - Access a strange account?There's an app for that! (yahoo.com)

bschorr writes: Three ladies from Georgia allegedly logged into Facebook from their mobile phones and found themselves inadvertently executing a sort of "man in the middle"
attack, finding themselves placed into the accounts of strangers. Fluke? Hoax? Serious and endemic network flaw? Does this have implications for sites more consequential than Facebook? Discuss!

Networking

Submission + - AT&T Glitch Connects Users to Wrong Accounts (boston.com) 2

CAE guy writes: "The Boston Globe reports: 'A Georgia mother and her two daughters logged onto Facebook from mobile phones last weekend and wound up in a startling place: strangers' accounts with full access to troves of private information. The glitch — the result of a routing problem at the family's wireless carrier, AT&T — revealed a little known security flaw with far reaching implications for everyone on the Internet, not just Facebook users.' Who needs to worry about man-in-the-middle attacks when your service provider will hijack your session for you?"

Comment Re:Of those 27% (Score 1) 175

That would probably be the percentage who mistakenly think that randomness is more important than length when it comes to passwords.

I see orgs all the time who think that "X7Y^i!6" is an awesome password. They force their users to create passwords they can never remember, despite the fact that they're only 6 or 7 characters long.

In fact they're far better off using pass PHRASES that the user can remember and are longer, and setting an intelligent account lockout policy. The phrases don't need to be written down on a post-it and they're more secure anyhow.

Comment Re:As a road warrior I should be using encryption. (Score 1) 175

No backups of confidential data? You're kidding, right?

Since confidential data tends to be among the most mission-critical data (in most organizations) I'd argue that it's the data MOST in need of backing up. The backups can (and should) be encrypted and stored in a physically secure location. But backups are essential.

If you don't back it up then you don't deserve to have it.

Comment Re:Does anyone beiieve this number? (Score 2, Insightful) 175

What about bank account info? Account numbers and balances? Saved passwords to financial sites or corporate resources? What about customer data? Credit card numbers? We see data in customer sites every day that shouldn't be exposed outside the organization. Granted it's not always found on portable devices but sometimes it is.

Whole disk encryption is really not difficult to do and it's a heck of a lot easier than having to apologize to all of your customers because you lost an unencrypted laptop with their information on it.

Slashdot Top Deals

"The fundamental principle of science, the definition almost, is this: the sole test of the validity of any idea is experiment." -- Richard P. Feynman

Working...