[5838] in cryptography@c2.net mail archive
Re: Internal vs external threats, any references?
daemon@ATHENA.MIT.EDU (David Honig)
Mon Oct 4 15:44:56 1999
Message-Id: <3.0.5.32.19991004091008.007dd430@pop.sprynet.com>
Date: Mon, 04 Oct 1999 09:10:08 -0700
To: Ben Laurie <ben@algroup.co.uk>, amir.herzberg@il.ibm.com
From: David Honig <honig@sprynet.com>
Cc: Jeff.Hodges@stanford.edu, cryptography@c2.net
In-Reply-To: <37F85E07.FE4D3AAF@algroup.co.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
At 08:57 AM 10/4/99 +0100, Ben Laurie wrote:
>How does this trojan horse or virus get onto the targetted computer? I
>don't know what you run behind your firewalls, but I certainly don't run
>anything that could get trojaned or virused.
Yes, but you're not the only one on your LAN. Is everyone as
careful as you? Consider that some recent malware runs without
explicit user action.
(Not trusting your own LAN is also a good argument for user-to-user
crypto vs. firewall to firewall, BTW.)
DH