On 2015-10-23, Michael Black <
et...@ncf.ca> wrote:
> This message is in MIME format. The first part should be readable text,
> while the remaining parts are likely unreadable without MIME-aware tools.
>
> --8323328-1748672732-1445621803=:21502
> Content-Type: TEXT/PLAIN; charset=Windows-1252; format=flowed
> Content-Transfer-Encoding: QUOTED-PRINTABLE
>
> On Fri, 23 Oct 2015, Osmium wrote:
>
>>
>> "78lp" wrote:
>>
>>> "Greymaus" <
ma...@mail.com> wrote in message=20
> information sent in the clear that helped to value the information=20
> encoded, and a lot of brute strength repetitive attempts.
>
> It's not that different from today, when we read about the "evil hackers"=
>=20
> and then it turns out not technical skill but social skill or blunder has=
>=20
> gotten them secret information.
>
> If they knew something might be important, from where it was coming from,=
>=20
> they would allocate resources to figure it out. And they were lucky that=
>=20
> the users of enigma got sloppy, just like people today use easy to=20
> remember passwords.
>
> Michael
>
> --8323328-1748672732-1445621803=:21502--
Who seems to know something aabout all that, Mr. Schnier(sp?) makes the
point that secure passwords are a balaance between ease-of-remembering
and security.
In reference to the Prince Philip hack years ago, mentioned elsewhere,
I think it turned out laater that the `hacker' worked in the next office to
the email server that the account was on.
I think that a lot of hacking incidences are systems that are insufficently
tested before being opened to public access. In one instance here, system was
opened to public access, crashed, the fat heads in charge blamed `hackers',
then actual professionals were brought in to run it.