Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> when they feel they can get away with it.

It's not just this. Security involves compromises and trade-offs. Humans will be stupid humans and re-use passwords, install better but insecure software, not ever update, etc. It's an old story.

In the year 2025, if communication with any other human on the globe isn't as simple as opening and app and typing, then people will find another way because there are about a thousand better ways.

So I doubt they are trying to get away with anything. They're just preferring the trivial option over the option that probably involves a physical token or slow biometrics or 15-second logout or whatever arduous security features the government comms probably have. Just like any human would.

Perhaps this will force the government COMSEC people to re-evaluate their practices.

Updated to add: I'm not defending their practices, just giving a likely explanation. Blaming the users is not always the best way to evaluate a security failure.



I would hope that when it comes to OpSec, SecDef, DoD, NSA, etc, don't act "Just like any human would."


All humans act like humans would. From a security standpoint, it is a mistake to assume otherwise in any context.

https://www.google.com/search?q=computer+security+human+natu...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: