WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2026 Poal.co

(post is archived)

[–] 0 pt

Insider threat is always been the primary threat. Also, you will never stop a truly motivated attacker. There are no systems that exist that cannot be broken into with enough effort. The only purpose of encryption is to "protect" the data long enough that if the data is cracked it is no longer useful.

The weak link in the chain is usually some idiot with too much clearance that found a USB drive (or something) in the parking lot and plugged it into a "secure" system. Even air-gaped systems are not safe.

[–] 0 pt

Watch videos about new tech which will make such stupidity impossible in high security envirnoment. Some really complex quantum stuff. btw. I newer buy this fairytales about USB drive or something which some retard plug in secure machine. Sound too much as cover up, damage control for some much more serious shit.

[–] 0 pt

It happens and often. I would give some examples but I need to get back to work x.x