Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: trumandogz
Not a great idea for a governor with national aspirations to use a Yahoo mail accoun

Oh, so it's her fault that a felon stole her data? Talk about blaming the victim.
50 posted on 09/17/2008 11:40:49 AM PDT by Antoninus (McCain/Palin -- The winning ticket!)
[ Post Reply | Private Reply | To 28 | View Replies ]


To: Antoninus

Not blaming the victim but simply stating that a governor of a state should not trust the security of their communication to a company that has very little e-mail security.

It would be like if you were to leave the front door of your house wide open when you were on vacation and were robbed.

The burglars are criminals but you used poor judgement in leaving your front door wide open.


78 posted on 09/17/2008 12:05:25 PM PDT by trumandogz
[ Post Reply | Private Reply | To 50 | View Replies ]

To: Antoninus

Not blaming the victim but simply stating that a governor of a state should not trust the security of their communication to a company that has very little e-mail security.

It would be like if you were to leave the front door of your house wide open when you were on vacation and were robbed.

The burglars are criminals but you used poor judgement in leaving your front door wide open.


79 posted on 09/17/2008 12:05:31 PM PDT by trumandogz
[ Post Reply | Private Reply | To 50 | View Replies ]

To: Antoninus
Oh, so it's her fault that a felon stole her data? Talk about blaming the victim.

The lion's share of the blame should always go to the person that performed the illegal act.

That said, if the victim doesn't perform due diligence then they deserve some blame too. There's nothing unusual in "blaming the victim" of a car theft if the victim left the keys in the ignition. That doesn't take anything away from the blame assigned to the car thief, but the car owner still should be chastised for leaving the keys where they provide easy access to a thief.

And, as usual, it all comes down to Layer 1. In computer networking Layer 1 is the physical layer, the wire. It's also a euphemism for the physical part of any network infrastructure from the room that it's in, to the cabinet the server sits in to the server case itself.

If you don't have physical control of the hardware, you don't really have control at all. Using a third party to manage your email means that a third party has access to your email. There's just no way around that.

My email server is at my house. A person wanting physical access to it is going to have to deal with locks, dogs, guns and alarms.

If your email is at Yahoo! or Google then the people that run the network there have access to it. If you're using your email account to receive email from eBay when you win something then it doesn't much matter.

If you're doing official government business then it does. If you are exchanging messages with someone and you'd rather not find them on the front page of the New York Times, then it does.

No one is saying that it's all the Governor's fault. But she did something dumb and someone else took advantage of that.

83 posted on 09/17/2008 12:10:36 PM PDT by Knitebane (Happily Microsoft free since 1999.)
[ Post Reply | Private Reply | To 50 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson