RapierFugue -> RE: We are not alone..... (8/4/2011 2:41:06 AM)
|
quote:
ORIGINAL: SirPumpy Sometimes its not what you do know, but what you dont that gets you in trouble. As for British Military Intelligence? BWAHAHAHAHAAAA! MI5/6 aren't the military. Neither are Coutts. I do know one military installation that uses wireless, but I would (being an honest sort of chap) admit that their installation isn't intended for sensitive material. It did, however, pass a Class Two penetration test, and they don't give those away free with cornflakes. I'm perfectly happy to believe you've worked with wireless systems in the past. But the market changes very quickly, and I work in this sector now, today, among other sectors (i.e. it isn't the only thing I do). My tech teams have installed wireless systems that are subject to blind/anonymous penetration testing by 3rd party companies, and of the 7 large-scale ones I've so far managed, only one failed, and that on something the tech team concerned was able to learn from, and implement change to, in order to pass second time around. I do also recall very strongly from my time in Aus some 20 years ago that, at the time, the technology (hard and soft) used in commercial Aus deployments was a good 3 years, and sometimes more, behind the curve, so that may be a factor, or of course things may have changed for the better there - my knowledge in that sector isn't current. I agree fully that current smartphone design, both firmware, wireless and apps, isn’t perfect, but as with all security systems you have to ask yourself what the degree of risk is, and what the result of a successful penetration is; with a smartphone the best they're going to manage is to copy a few MP3s, download my pics (big whoop) or possibly brick my phone temporarily (although I've yet to see a practical demo of that outside of a highly specious lab environment). None of it is a big security risk, unless you're in the habit of leaving documents on your smartphone containing full details of your online banking; I repeat, they can't spoof the IMEI numeric, nor can they leverage my call ID or SIM card ID merely by penetrating the Android (or Win7, but iPhone I don't know about) platform - if they did there would be an epidemic of phone cloning, and there isn't, at least not by that method. Wireless networks are not themselves inherently un-secure, and given the number of large-scale, commercially sensitive sector companies using wireless these days, it would be a reasonable assumption that the technology has come of age. Is it 100% secure? Of course not. But then, neither is a hard-wired system either. And for home users, so long as they install basic protection (excellent examples of which are now available for free) to prevent Trojan or other breeches, make sure their systems are current as far as updates are concerned, and secure their wireless networks with encryption and access control, then the average home body using anything from XP onwards is not going to be any more at risk from wireless penetration by average class crackers than they would be if they used the far less convenient method of hard wiring.
|
|
|
|