On Tue, Mar 01, 2022 at 09:11:46AM -0500, Stefan Monnier wrote:
> to...@tuxteam.de [2022-03-01 07:35:20] wrote:
> > I see.  As others have already noted in this thread, your WiFi PSK
> > isn't usually a high-value secret; besides, if someone has access
> > to your computer, she typically has more valuable things to look
> > for.
> 
> OTOH, by putting barriers only at those places where we can think
> of attack scenarios we end up with rampant security issues, because
> attacks are more diverse/creative than we can ever be.

Definitely. 

I think the most important thing to keep around is "context matters", which
more or less corresponds to what secuity buffs call "threat model". What
kind of stuff are you trying to defend against?

 - Is it only your home's access point's secret key what is at stake, or
   your friend's, workplace's, etc?

 - Are you defending against your computer "at rest" being stolen (in
   which case perhaps a full disk encryption might Just Do (TM) or are
   you defending against some javascript-vectored trojan coming in
   via your browser (or some macro through some *cough* text processing
   software)?

And so on. Security can be very amusing :-)

This permission based securisation carries over many things from the
good ol' times of real multiuser systems. Now of course it's one road
bump more: should my browser ask me for my password I'd tend to kill
it right away; most folks wouldn't be that cruel :-)

Cheers
-- 
t

Attachment: signature.asc
Description: PGP signature

Reply via email to