Go ![]() | New ![]() | Find ![]() | Notify ![]() | Tools ![]() | Reply ![]() | ![]() |
Oh stewardess, I speak jive. ![]() |
First source
Just saw this this morning. Still reading up on it myself. | ||
|
Oh stewardess, I speak jive. ![]() |
Second source
| |||
|
Member |
Hmm?? Amazon, Jeff Bezos, GOP data hack? Naw, that's just too much of a stretch. -.-. --.- -.-. --.- -.-. --.- -.-. --.- It only stands to reason that where there's sacrifice, there's someone collecting the sacrificial offerings. Where there's service, there is someone being served. The man who speaks to you of sacrifice is speaking of slaves and masters, and intends to be the master. Ayn Rand "He gains votes ever and anew by taking money from everybody and giving it to a few, while explaining that every penny was extracted from the few to be giving to the many." Ogden Nash from his poem - The Politician | |||
|
Member |
Everything about you is already out there, according to many experts. The money to be made by crooks is from your medical records, from what I've been told. A young guy I had a casual conversation with said that by just using a photograph of your face, he can find out just about everything about you in less than a day. | |||
|
Member |
Damned Russkies! "Crom is strong! If I die, I have to go before him, and he will ask me, 'What is the riddle of steel?' If I don't know it, he will cast me out of Valhalla and laugh at me." | |||
|
Member |
I will repeat my mantra, despite the exhortations to the contrary, to NEVER put super critical data into the cloud!!! Never. Ever. As. Long. As. It.Lives. Multiple break ins to every conceivable public storage configuration happens ALL the time. Never. Ever. I should be tall and rich too; That ain't gonna happen either | |||
|
Just because you can, doesn't mean you should |
I've always believed nothing's a secret if more than one person knows it. ___________________________ Avoid buying ChiCom/CCP products whenever possible. | |||
|
Member![]() |
My thoughts too. You wouldn't hang your car keys on the antenna of your car and you wouldn't leave your house keys on the front porch. You wouldn't sleep spread eagle naked on the front lawn. Then WHY would you trust someone's cloud service with your data?? ———- Do not meddle in the affairs of wizards, for thou art crunchy and taste good with catsup. | |||
|
Fool for the City![]() |
Is that 198 million Republican voters? How do we ever lose any election? _____________________________ "A free people ought not only to be armed and disciplined but they should have sufficient arms and ammunition to maintain a status of independence from any who might attempt to abuse them, which would include their own government." George Washington. | |||
|
Member![]() |
Because 93 million die every day due to gun violence. . | |||
|
Member![]() |
You win the internet today ![]() | |||
|
Oh stewardess, I speak jive. ![]() |
![]() | |||
|
Serenity now!![]() |
Unfortunately, we're not always in control of the data concerning us. Someone can go to great lengths to protect their identity, and then find out their data has been compromised by doing something as simple as registering to vote. Ladies and gentlemen, take my advice - pull down your pants and slide on the ice. ʘ ͜ʖ ʘ | |||
|
Member![]() |
This is just ONE of the reasons my company is NOT going to any cloud services for certain systems. THAT kind of data should be kept internal and well protected. I guess you could call this IT incompetence on a gargantuan scale. Good lord. Lover of the US Constitution Wile E. Coyote School of DIY Disaster | |||
|
member |
I know my data "out there" in multiple ways, but I have very low regard for the major political parties keeping out of my life. We are registered as "unaffiliated", or whatever classification AZ uses. We can still pick a primary to vote in. The main pain is how they harvest the registration rolls to feed into their robocalling campaigns. | |||
|
Seeker of Clarity![]() |
The cloud is really not the issue. A massive dataset kept unencrypted and unsecured on a private network would be (in some ways) just as bad. Maybe worse. Because on a private network, the security researcher wouldn't find it. He's not hacking, he's just scanning. But on a private network, generally (with the exception of more advanced companies), only the bad guys scan. And when they find, they exfiltrate. Border security reliance is a thing of the past. Assumption of breach and defense in depth (layers) is the only viable answer. And encryption is rule number 1. Gross negligence. ![]() | |||
|
Powered by Social Strata |
![]() | Please Wait. Your request is being processed... |
|