decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
Why wasn't the laptop FULLY encrypted to begin with? They want more laws, yet they fail to know | 129 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
Why wasn't the laptop FULLY encrypted to begin with? They want more laws, yet they fail to know
Authored by: Anonymous on Tuesday, September 04 2012 @ 10:18 AM EDT
Why wasn't the laptop FULLY encrypted to begin with?

Typically, I find that most people, in business, laywers, doctors, etc... are clueless about tech and the real risks.

And, the answer, that the government and lawyers seem to think of first is to make a law to require computer security, and that those who write software with bugs are to then, become criminals themselves (just because they write code the only way it can be written).

OMG... to use a computer one should read this by Jennifer Lapell, for starters,
...and then pick up a few books by Bruce Schneier and others. AND, then pass a test that tells us that they understood what they read!

Then, if they still want to create laws to protect us, they should be sent to see a psycologist, because they have us fooled in some way to pass the test and still be _______s!

A secure computer network has not been invented, so it can't be legislated.

Computer Security is an oxymoron, period.

If the government needs help, it's in understanding that!!!

[ Reply to This | Parent | # ]

They Got 12 Million iPhone Accounts & Posted 1 MILLION? Wow!
Authored by: Anonymous on Tuesday, September 04 2012 @ 04:47 PM EDT
Just thinking you gotta be weary of buying an iPhone now. Not
only did they expose the fact that the FBI must be collecting
these for some crazy reason, but these people's accounts are
in jeopardy as well. If not their lives. Addresses, Phone
numbers, email... these hackers could spoof their accounts
and threaten all kinds of havoc.

But still what is the FBI doing with 12 Million iPhone users
private information??? Now that to me is the scary part!

[ Reply to This | Parent | # ]

Are Android devices really any better?
Authored by: Anonymous on Tuesday, September 04 2012 @ 04:52 PM EDT
- a study by one privacy researcher in 2011 found that 74% of the apps he tested sent a user’s UDID to a remote server. But the same researcher also found that five out of seven social gaming networks he tested allowed users to log in with only their UDID, making a stolen UDID equivalent to a stolen password.
forbes

So would somebody please tell me how to require an ICS handset to ask for my password when I want to log on somewhere? Oh I know, passwords are so old school, weak security, annoying to do on a small touch screen, &c. &c., but at least a password request is an indication to the user that some token effort to security is being made. Or is that why they now call it the Play Store? I just checked my phone, it has one hundred twenty nine certificates, multiples from some like thawte and verisign, and others from places I never heard of. This is a factory clean rom installed two days ago, and only been to Google, Groklaw and my local newspaper.

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )