Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What if this tweet was provided as "evidence" of the opposite claim:

> I think the situation at @LastPass may be better than they are letting on. > > On Sunday the 18th, four of my wallets were completely safe. There were no losses. > > Their seeds were kept, encrypted, in my lastpass vault, behind a 16 character password using all character types.

IOW, the honesty and integrity of the user does not matter. What matters is some form of verification of the cause of a breach, because this single post presents no useful evidence for determining the cause of the breach, most especially ruling out over-the-shoulder attacks.

What has confounded me for a long time is this question: are there no breaches of security cameras? I can spend time in a Starbucks and always see someone enter a password into some device, I do not recall reading that a security camera system has been hacked, yet I would assign an incredibly high value to security cameras in places like coffee shops, airports, hotel lobbies, etc.



Because that's not how evidence work.

There are fewer ways to get the data than reasons why the data has not (yet) been used.

You can't prove there was no breach.


Being unable to prove there was not a breach is correct because you are unable to prove there was a breach, meaning there is no useful evidence in the post.

As I demonstrated in what might be called talking past the sale, there are other attacks that have nothing to do with the security of the technologies used.

I don't know the person who originally stated this, but as the popular refrain goes: "security is a process, not a technology."




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: