{"id":77043,"date":"2021-03-03T05:00:00","date_gmt":"2021-03-03T11:00:00","guid":{"rendered":"http:\/\/www.shotinthedark.info\/wp\/?p=77043"},"modified":"2021-03-01T06:47:14","modified_gmt":"2021-03-01T12:47:14","slug":"insecurity-theater","status":"publish","type":"post","link":"http:\/\/www.shotinthedark.info\/wp\/?p=77043","title":{"rendered":"Insecurity Theater"},"content":{"rendered":"\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Two-Mask-Tony has famously decreed that if one mask is good, two masks<br>is better.\u00a0 I figured out where he got the notion: from software<br>security people.<\/p><p>My password to remotely log into the work computer is the same password<br>as I use to log into the various software programs on the work server.\u00a0<br>What&#8217;s the point of every program having a password if they&#8217;re all the<br>same?\u00a0 Since I know the password to get into the computer itself, I know<br>the password for everything else, too.<\/p><p>It&#8217;s as if they expect to thwart some cartoon villain tapping on my<br>keyboard.\u00a0 &#8220;Dammit, I made it through the first nine passwords, but now<br>I can&#8217;t get into the timesheet system to report my hours for payroll.\u00a0<br>Curses, foiled again!&#8221;<\/p><p>Joe Doakes<\/p><\/blockquote>\n\n\n\n<p>I&#8217;ve <a href=\"http:\/\/www.shotinthedark.info\/wp\/?p=76577\">cracked wise about this<\/a> in the recent past. <\/p>\n\n\n\n<p>It&#8217;s easy to design &#8220;perfect&#8221; safety:  wear  <em>ten <\/em>masks, and never leave the house!<\/p>\n\n\n\n<p>The costs of that approach never seem to enter these peoples&#8217; thinking. <\/p>\n\n\n\n<p>Perhaps because it costs <em>them <\/em>nothing. <\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Two-Mask-Tony has famously decreed that if one mask is good, two masksis better.\u00a0 I figured out where he got the notion: from softwaresecurity people. My password to remotely log into the work computer is the same passwordas I use to log into the various software programs on the work server.\u00a0What&#8217;s the point of every program [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-77043","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/www.shotinthedark.info\/wp\/index.php?rest_route=\/wp\/v2\/posts\/77043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.shotinthedark.info\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.shotinthedark.info\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.shotinthedark.info\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.shotinthedark.info\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=77043"}],"version-history":[{"count":1,"href":"http:\/\/www.shotinthedark.info\/wp\/index.php?rest_route=\/wp\/v2\/posts\/77043\/revisions"}],"predecessor-version":[{"id":77052,"href":"http:\/\/www.shotinthedark.info\/wp\/index.php?rest_route=\/wp\/v2\/posts\/77043\/revisions\/77052"}],"wp:attachment":[{"href":"http:\/\/www.shotinthedark.info\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=77043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.shotinthedark.info\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=77043"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.shotinthedark.info\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=77043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}