If you liked this post, you may also be interested in...
- Phoenix City Council Says PD Can Have Surveillance Drones Without Any Policy In Place Because Some Officers Recently Got Shot
- New Right To Repair Bill Targets Obnoxious Auto Industry Behavior
- Former Employees Say Mossad Members Dropped By NSO Officers To Run Off-The-Books Phone Hacks
- San Francisco Cops Are Running Rape Victims' DNA Through Criminal Databases Because What Even The Fuck
- Clearview Pitch Deck Says It's Aiming For A 100 Billion Image Database, Restarting Sales To The Private Sector
Reader Comments
Subscribe: RSS
View by: Time | Thread
No Subject Given
Two ideas come to mind:
(1) disable the fast-and-historical save options until the user specifically chooses to enable them; the oblivious user should be protected.
(2) when you save historical information, save it encrypted by default. The worst case is when the user can't unlock their own hidden historical data, which isn't all that bad. Encrypt to a machine+user specific metric, which automatically unlocks when opened by the same detected machine+user, or offer a more complete encryption path that encrypts according to a provided pki or simple password. Even WEAK encryption would be a big win here, but there are plenty of much stronger crypto standards *built into everyday operating systems*.
[ link to this | view in chronology ]
here are the Microsoft articles on this
http://support.microsoft.com/default.aspx?scid=kb;EN-US;211209
http://support.microsoft.com/defau lt.aspx?scid=kb;EN-US;197978
[ link to this | view in chronology ]