Most people are going to whoosh at the numbers, too. 33% of Democrats believe humans poofed into existence; 57% of Republicans think the same; 33% overall believe this way.
Windows does the same thing. Does it automatically connect to Wifi when it boots?
We can store them in an exotic form of plaintext, like encrypted with the encryption key in
If you want the system to use a wifi connection as its primary--to boot and enable wifi, or to allow all users to enable wifi--the wifi connection must store the password in plaintext.
Think like this: You get a wire, plug in an RJ-45, and tell the system to enable that on boot. When you boot, you're online.
Now, if you use wifi, to do this, you have two options. The first is for a user to log in, connect to wifi, and store the password encrypted in keyring. The next user logs in (after the first logs off, or after a reboot) and, not knowing the password, can't use the network on that machine. The second option is to store that password in plaintext, accessible by a system level service (or, alternately, by all users). At boot, the system service enables the network connection; any user with access rights to enable or disable the network connection can send a message to the service to do so, and the service will read the password from disk.
In the second scenario, if you create an encryption key and encrypt the password, you need to store the key in plaintext. An attacker would get the key and use it to decrypt the password in the same way as he'd obtain the plaintext password, so technically you are still storing plaintext--just in a different format involving multiple files. It's not encrypted until it's separated from the key. An encrypted e-mail is encrypted because only the sender and recipient have the key--the sender usually generates a session key and encrypts that with a public key, so usually no longer has the key after sending it. A third party would have an encrypted blob and no key. If you encrypted the e-mail and stored a private key to decrypt it on the same system, protected by a password stored in a text file on the same system, then administrative access gives you full access to everything--essentially, the message is stored in plaintext. That's a stretch; but if your system fundamentally functions such that it must store some data, and stores that data and an encryption key "to encrypt it", you're storing plaintext--the "encrypted" data is never transported, and the key is just theater.
So this isn't an example of poor security; it's an example of "the only way to accomplish this particular goal".
Not really. What else did the CIA give bush? Briefings on 3000 other terrorist attacks just about to happen, from 250 other terrorist groups in 87 countries? All that intelligence is like an oil field and you're looking for that one quart of oil that's going to burn ultra-hot because of its unique composition. One day it ignites while you're sucking it out of the ground and the rig blows up, and people are like, "There were so many warning signs, the equipment was groaning, it was out of maintenance, some drills had failed, engineers on the team had warned that this could happen..." and what really happened was a piece of sulfated rock came up in the oil that day, and would have ignited a brand-new, inspected, perfectly functional rig anyway, and we've NEVER had a piece of sulfated rock cause a fire like that so nobody could have possibly predicted that could be an actual thing.
Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.