tag:blogger.com,1999:blog-18157064.post995491936439833919..comments2024-03-18T02:14:57.204-07:00Comments on Google Operating System: Security at GoogleAlex Chituhttp://www.blogger.com/profile/02618542750965508582noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-18157064.post-79335191270735738702016-04-16T08:06:53.805-07:002016-04-16T08:06:53.805-07:00You have a very good site, well constructed and ve...You have a very good site, well constructed and very interesting i have bookmarked you, hopefully you keep posting new stuff, many thanks<br /><a href="http://www.tseonline.org/" rel="nofollow">armed security service</a>Jhon Marshalhttps://www.blogger.com/profile/04118920802938626798noreply@blogger.comtag:blogger.com,1999:blog-18157064.post-82769259179262857762007-02-22T12:01:00.000-08:002007-02-22T12:01:00.000-08:00People also need to wake up to the fact that the s...People also need to wake up to the fact that the security of their online data depends on a variety of factors, and the google data centers are only one of them. If anything (further demonstrated by this paper) the google data centers are probably the safest link in the chain.<BR/>As Philipp mentioned, what kind of hacker will try to attack a google data center to get to your data?<BR/>The weakest links in the chain are probably:<BR/>- SSL encryption: Google still does not use a secure connection to send your data to your browser, unless you force it yourself. Without a secure connection, data is flowing unencrypted and can be snooped upon by a hacker watching IP packets go by.<BR/>- client-side encryption: someone with access to your computer, if you are logged into your Google account (this is increasingly the case) can view and download your files without the need to even know your password. This is a serious security issue until Google can provide tools for users to protect sensitive files.<BR/>check this on the subject: http://lepetitradiateur.blogspot.com/2007/01/suggestion-increased-security-in.htmlHugohttps://www.blogger.com/profile/10791323181993026851noreply@blogger.comtag:blogger.com,1999:blog-18157064.post-23425968877370768322007-02-22T11:27:00.000-08:002007-02-22T11:27:00.000-08:00Wizard_2, that wasn't the only incident concerning...Wizard_2, that wasn't the only incident concerning Gmail. I know that TechCrunch exaggerated the whole thing, but I tried to be balanced and show that Google's security measures are not flawless.Alex Chituhttps://www.blogger.com/profile/02618542750965508582noreply@blogger.comtag:blogger.com,1999:blog-18157064.post-24822599329051396012007-02-22T11:14:00.000-08:002007-02-22T11:14:00.000-08:00I'm seriously sick of people, no of googlesystem a...I'm seriously sick of people, no of googlesystem and tech crunch and everybody bringing up the email deletion incident. The link you provide says that it was a security flaw in firefox that made it possible. To google, those users went and deleted their own mail and contacts. Had the criminal hacker to setup the attack targeted yahoo or hotmail, it wouldn't have been any different.<BR/><BR/>Quit harping on that.reconbothttps://www.blogger.com/profile/07341340191732395876noreply@blogger.comtag:blogger.com,1999:blog-18157064.post-52637657685072983712007-02-22T09:36:00.000-08:002007-02-22T09:36:00.000-08:00I wonder how Yahoo and Microsoft protect our data?...I wonder how Yahoo and Microsoft protect our data?!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-18157064.post-67295849124745786952007-02-22T09:27:00.000-08:002007-02-22T09:27:00.000-08:00actually, armed personal are normally arond most ...actually, armed personal are normally arond most DC. This is part of the physical security..<BR/><BR/>Actually Philipp, some of the most intriguing Hacks have been access to a vault ..its prety easy once you have fake ID's and social engg skills !!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-18157064.post-1949678990373089472007-02-22T09:18:00.000-08:002007-02-22T09:18:00.000-08:001) Not all evil-doers aim to hack - some aim to de...1) Not all evil-doers aim to hack - some aim to destroy. Ergo, all the software protection in the world is useless without physical protection.<BR/><BR/>2) Give me physical access to your PC(s) and (unless all your data is encrypted to a level I haven't the horsepower to break) all your firewalls are useless .steeleweedhttps://www.blogger.com/profile/02077739629921574784noreply@blogger.comtag:blogger.com,1999:blog-18157064.post-43035118069621000632007-02-22T08:19:00.000-08:002007-02-22T08:19:00.000-08:00> These facilities are protected> with armed perso...> These facilities are protected<BR/>> with armed personnel around the<BR/>> clock.<BR/><BR/>Holy shit. They sure try to scare people.<BR/><BR/>Then again what kind of hacker tries to unveil data by just waltzing into a datacenter? Most hackers can do their job fine from home :)Philipp Lenssenhttps://www.blogger.com/profile/09340991515644165702noreply@blogger.com