opsec
Unterschiede
Hier werden die Unterschiede zwischen zwei Versionen der Seite angezeigt.
Beide Seiten, vorherige ÜberarbeitungVorherige Überarbeitung | Letzte ÜberarbeitungBeide Seiten, nächste Überarbeitung | ||
opsec [2013-05-24 14:11] – Added link to KISS principle. house | opsec [2013-05-24 15:57] – house | ||
---|---|---|---|
Zeile 5: | Zeile 5: | ||
OpSec can be hard or easy, it depends to a great deal on the threats you have to counter. To give you an example, let's take a look at someone communicating via e-mail using the same infrastructure. This can be an e-mail client configured with different accounts used by the same person. Even if you encrypt all your e-mail content, you will still be generating transaction logs with addresses in clear. These logs can be on your local machine and very likely on machines belonging to your ISP(s). [[https:// | OpSec can be hard or easy, it depends to a great deal on the threats you have to counter. To give you an example, let's take a look at someone communicating via e-mail using the same infrastructure. This can be an e-mail client configured with different accounts used by the same person. Even if you encrypt all your e-mail content, you will still be generating transaction logs with addresses in clear. These logs can be on your local machine and very likely on machines belonging to your ISP(s). [[https:// | ||
- | OpSec aims to avoid information leaks of this kind. | + | OpSec aims to avoid information leaks of this kind (which is a simple example, OpSec is about much more!). |
OpSec also helps to think in different contexts and to grasp the threats behind the technologies used. "I use TOR on my cell phone." | OpSec also helps to think in different contexts and to grasp the threats behind the technologies used. "I use TOR on my cell phone." |
opsec.txt · Zuletzt geändert: 2013-06-19 10:45 von house