The European Tribune is a forum for thoughtful dialogue of European and international issues. You are invited to post comments and your own articles.
Please REGISTER to post.
The rule of good security is that the amount of effort that the attacker has to spend to penetrate your security, less the amount of effort you have to spend to maintain your security has to be greater than the higher of the value to you of not having your security penetrated or the value to the attacker of the attacker penetrating your security.
In practice, there are four groups of people that a private individual does not want to share his mail with, in roughly descending order of capabilities:
To prevent your boss from reading your mail, it will probably suffice to assume that he monitors all traffic that touches hardware he actually owns. So maintain strict segregation between work hardware and networks and personal hardware and networks, and never use the former for anything you don't want your boss to read along with. Assume that your boss installs keyloggers on anything he lends you.
Assume that all major governments and most major corporations will read anything you commit to electronic signal in any form.
- Jake Friends come and go. Enemies accumulate.
by Frank Schnittger - Mar 11 11 comments
by Frank Schnittger - Mar 8 3 comments
by Frank Schnittger - Mar 6 4 comments
by gmoke - Mar 7
by Frank Schnittger - Mar 2 1 comment
by Frank Schnittger - Mar 5 2 comments
by gmoke - Feb 25
by Oui - Mar 241 comment
by Oui - Mar 23
by Oui - Mar 231 comment
by Oui - Mar 21
by Oui - Mar 191 comment
by Oui - Mar 19
by Oui - Mar 18
by Oui - Mar 175 comments
by Oui - Mar 16
by Oui - Mar 164 comments
by Oui - Mar 1510 comments
by Oui - Mar 155 comments
by Oui - Mar 147 comments
by Oui - Mar 1312 comments
by Oui - Mar 12
by Oui - Mar 1113 comments
by Frank Schnittger - Mar 1111 comments
by Oui - Mar 1116 comments
by Oui - Mar 109 comments
by Frank Schnittger - Mar 104 comments