Comment by miohtama
5 years ago
Another solution: plugging attack vectors, like users ability run arbitrary non-sandboxed binaries. Server-side systems and thin clients are almost bullet proof. No virii for Chromebooks.
5 years ago
Another solution: plugging attack vectors, like users ability run arbitrary non-sandboxed binaries. Server-side systems and thin clients are almost bullet proof. No virii for Chromebooks.
How likely do you think this is to make a significant dent in, say, the next 18 months?
> Server-side systems and thin clients are almost bullet proof.
Thin clients, maybe. Service-side systems, not so much.
I remember multiple pre-auth code exec bugs in VPN concentrators and other Internet-facing security appliances this year alone.
I really want to believe that better security practices can save us all, but somehow I've lost hope during the last 10 to 12 months...
Yet