On 10/31/25 09:40, Laurenz Albe wrote:
> On Fri, 2025-10-31 at 08:21 -0700, Adrian Klaver wrote:
>> Yeah, what I would like to know is how many of the data breaches
>> actually grab directly from the storage versus getting it through the
>> database or other software above the storage? It seems to me social
>> engineering plays a bigger role in this.
>
> This is not about actual security considerations, it is about checkboxes.
> Consequently, rational arguments are missing the point.
Alright, been there.
Years ago I used to drive a delivery truck for wholesale greenhouse and
one of my chores was to go to a remote greenhouse we operated and
pickup/deliver plants. There was a whole process for securing the key
that you used to open the entry door. I pointed out that the greenhouse
walls where two layers of plastic inflated by an air blower and then I
proceeded to pull out my pocket knife as an example of a 'universal'
key. The door key process stayed because it made people feel the
greenhouse contents where safe. FYI, things did get stolen though that
was because folks left them outside and the thieves did not have to
bother with a knife.
>
> Yours,
> Laurenz Albe
--
Adrian Klaver
adrian.klaver@aklaver.com