<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<div class="moz-cite-prefix">On 2024-07-24 20:41, Ron / BCLUG via
talk wrote:<br>
</div>
<blockquote type="cite"
cite="mid:ccda9ceb-c2ce-430b-a10c-c841b113702c@bclug.ca">Steve
Petrie via talk wrote on 2024-07-23 07:47: <br>
<br>
<blockquote type="cite">Actually I'm REALLY GLAD that linux owns
such a tiny share of the desktop PC market. This means that evil
virus hackers have almost ZERO incentive to invest their time
crafting attacks on linux desktops.
<br>
</blockquote>
<br>
I'd say you've got it backwards - the high value targets are the
servers more so than the desktops. <br>
<br>
</blockquote>
<br>
<p>We used to worry a lot about someone getting into a salesperson's
laptop, and using that to get to our backbone. We created a
windows-only network for them, with mandatory access control and
physical separation. </p>
<p> At least one closely-regulated customer wouldn't let anything <i>intel</i>,
much less PC, onto their back end networks Only a colleague and I
who had SPARC laptops had direct access to the data center from
the outside. Everyone else had to log in to a gateway box and work
from the command-line. (For some reason they didn't have Macs)</p>
<p>The underlying problem is called "transitive trust", where the
attacker works through layer after layer because they each trust
him<i> a bit too much</i>. And the first step is always a
salesperson's laptop (:-))<br>
</p>
<p>--dave<br>
</p>
<pre class="moz-signature" cols="72">--
David Collier-Brown, | Always do right. This will gratify
System Programmer and Author | some people and astonish the rest
<a class="moz-txt-link-abbreviated" href="mailto:davecb@spamcop.net">davecb@spamcop.net</a> | -- Mark Twain</pre>
</body>
</html>