Operating systems are getting more promiscuous about net connections, not less: expect operating systems to start seeking out Bluetooth-enabled 3G phones and using them to reach out to the net when nothing else is available.
Later, he wrote:
In the era of cheap and easy virtualisation and sandboxing, there's no reason users shouldn't be able to partition their computers into "dirty" public-facing sides and "clean" private sides. Of course, a user might subvert this separation deliberately, but the only way to comprehensively prevent that from occurring is to make it possible for a user to get the job done without needing to do so.
It's a very interesting article, definitely worth a read. One thing he barely touches on is how IT employees (in my experience) are the most abusive of security policy. They feel like since they know the reason for the rules, they can safely break them. Like they're above it. Above it--wait, where have I heard that before?
No comments:
Post a Comment