Comment

Tech Note: jQuery 1.6 Installed, All Systems Go

256
Achilles Tang5/03/2011 5:34:49 pm PDT

re: #108 Charles

Well, yeah … but the problem is that a hacker who gains root access (which the Sony PS hacker did) can disable any protection like that.

I don’t want to belabor the point, but I am not an expert on this, like you :)

However, why can one not, for sensitive data servers, have an independent router, not accessible via the network, through which all traffic passes and from which all traffic patterns are analysed and allowed or not allowed?

My CC provider calls me 10 minutes after I use my card in some way that is outside my usual pattern, and they hold the payment until I confirm. I just don’t understand how billion dollar corporations can’t do that with their sensitive data.