On Wed, Jul 9, 2014 at 5:44 PM, Ted Mittelstaedt <t...@ipinc.net> wrote:
>
>
> On 7/9/2014 11:37 AM, Mauricio Tavares wrote:
>>
>> On Wed, Jul 9, 2014 at 2:23 PM, Ted Mittelstaedt<t...@ipinc.net>  wrote:
>>>
>>>
>>> First of all why do people insist on hiding names of companies that
>>> do stuff like this?  It just makes it look like your manufacturing
>>> an event that doesn't exist, it destroys your credibility.
>>>
>>        You mean besides NDAs and policies that at the very least might
>> cause those people to be fired by their employers? If you ever went to
>> a defcon open presentation, they do their best not to divulge the
>> names of involved parties.
>>
>
> Correct, but THEY ARE SAYING that they are under NDA and can't talk about
> it.  They readily admit they are profiting off the evildoing of
> their customers or whatever, and quite often they have worked relentlessly
> within their organizations to change the SOP, and are
> known a gadflys, and their employer is well aware of their views.
>
> They speak at DEFCON because they hope that if enough people are educated to
> bad security practices that sooner or later an outside force will either
> convince their employer they were right all along,
> or if there's enough agreement they are correct by 3rd parties, their
> employer may be convinced.
>
> David DID NOT say that.  He said that "he was shocked to discover"  Why are
> you assuming he is under NDA or he is an employee of this company?
>
> He did not say this large DP company was his meal ticket.  Are YOU
> saying that this is his meal ticket?
>
> But there is a larger issue here that I will address - this insistence of
> cowardly hiding behind NDA to protect rule breakers.  David DID not
> say he did that - YOU are saying he did - and YOU appear TO BE ARGUING
> IN FAVOR OF DOING IT.
>
> What it boils down to is who are your sympathies for?  The people
> breaking the rules or the thousands of other
> people who are going to find out after signing up with the rule
> breakers that they use questionable and unsafe business practices?
>
> Now, in MY opinion there are only TWO ways to handle organizations
> like "large data processing company"
>
> The first is to work within the system - if for example Large DP
> Company _is_ a customer of David's he goes to them, explains the danger,
> recommends they correct it.
>
> Then when he posts here he says "I was shocked to discover and my
> customer and I are working to correct it" or some such.  I have plenty of
> respect for that, and posting that encourages other IT people to
> do the same.
>
> The second way is to work outside of the system.
>
> You start by sending an anonymous letter to the large DP company
> outlining the security issue and giving them 3 months to correct it or
> you will go to the press.
>
> If they haven't corrected it in 3 months you anonymously post details
> of what they are doing to every security blog and mailing list you
> can find.
>
> In that case, you NEVER, EVER breath a word of the security problem to
> anyone.  No one in the company, no one outside of the company.  You make
> absolutely sure there's no possible way it can be traced back to you because
> trust me they are gonna try like hell to find whoever ratted them out.
>
> I presume David IS NOT doing that or we wouldn't be having this discussion.
>
> If you cannot do either of those options THEN GET THE HELL OUT OF HIGH TECH
> WE DON'T NEED YOU.
>
> You are an administrator.  YOU ARE PAID BY CLUELESS USERS TO PROTECT THEM
> AND THEIR DATA, DAMMIT.  They trust you.  When you walk on by something like
> this business David posted about, and DO NOTHING, you are breaking their
> trust.  THIS is my beef with David's post.  Merely
> posting "hey this is what someone is doing" is just walking on by, kicking
> the can down the road, doing nothing.  THIS is what destroys your
> credibility.
>
> Users don't understand the dynamics of it.  They aren't qualified to advise
> you no matter what they tell you and what you think - if they were, they
> wouldn't be paying you to do the job.
>
> Defending the people like Large DP Company is morally wrong and
> bankrupt.  Mauricio, you need to seriously think about what your saying.
> Would you want the doctor of your child to say nothing when you tell him
> your a 2 pack a day smoker in your home?  Well probably
> you would - but the doctor's responsibility is to the helpless
> child, not to you.  The IT admin's responsibility is to the helpless users
> not to a rule-breaking large data processing company.
>

      You are putting words in my mouth.  Since you assumed to know
what I am thinking and spent a lot of time writing those brilliant
paragraphs to expand on that, I think it would be unfair of me to say
anything else. And besides, I do not like horses, be them high or low.
Never did.

> Ted
>
>
>>> Secondly, if you think that this is an example of "badness" on Windows
>>> security best practices you simply have not seen Windows deployed in
>>> 90% of production networks out there.  This is NOTHING compared to S.O.P.
>>> on
>>> most Windows setups.
>>>
>>> Imagine MS-DOS/LanManager network security model of 30 years ago.  Now
>>> imagine Windows networks today in the vast majority of production
>>> installs.
>>>
>>> NO EFFING DIFFERENCE!!!!!!!!!
>>>
>>> Ted
>>>
>>>
>>> PS:  Naturally there will be some Windows-kool-aid drinker who is going
>>> to angrily reply to this post claiming Windows is secure if people just
>>> followed Microsoft's directions.....
>>>
>>>
>>>
>>> On 7/9/2014 11:06 AM, David F. Skoll wrote:
>>>>
>>>>
>>>> On Wed, 09 Jul 2014 05:44:34 +0200
>>>> Karsten Bräckelmann<guent...@rudersport.de>   wrote:
>>>>
>>>>> If you deliberately try to sneak past sensible security measures, you
>>>>> should not be surprised to be blocked. The attempt by an honest user
>>>>> to disguise any $file (he did it on purpose, so he knows there's
>>>>> issues with that) is in no way better than a dis-honest user
>>>>> disguising a file.
>>>>
>>>>
>>>>
>>>> Since implementing this rule, I have been *shocked* to discover that a
>>>> large data processing company (name hidden to protect the guilty)
>>>> sends out information about credit-card processing in the form of
>>>> obfuscated Microsoft Windows executable files!!!  (They're renamed to
>>>> end in ".ex" instead of ".exe")  I tried running one of these files
>>>> inside
>>>> Wine.  It's a "PGP Self Decrypting Archive" that asks for a passphrase.
>>>>
>>>> The mind boggles!  *THIS* is the state of Windows "security" best
>>>> practices?
>>>>
>>>> Regards,
>>>>
>>>> David.
>>>
>>>
>>>
>>> ---
>>> This email is free from viruses and malware because avast! Antivirus
>>> protection is active.
>>> http://www.avast.com
>>>
>
> ---
> This email is free from viruses and malware because avast! Antivirus
> protection is active.
> http://www.avast.com
>

Reply via email to