Douglas,<div><br></div><div>I am in same line of though with you and others.</div><div><br></div><div>The issue here is on practical part of things - would you tell us what is in you wallet in the open? I m talking about security at another level which I do not belong to - that is beyond the lab environment. You read what our friend from Nigeria was fearing about....<br>
<br>The principle of Not Trusting more than yourself holds out there... it is in the lab, I am afraid to stick to that.</div><div><br></div><div>Would you disclose high level security weaknesses in the open? Like how data is handled and managed by your power network or Central bank? In that case consider yourself a security threat - I am afraid so, Let us keep these discussions at laboratory level - may be that is why some institutions were attacked? people sharing such information in the open...? I m glad I am just a beneficent and promoter of the use of Internet everywhere and everything BUT Securely</div>
<div><br></div><div>Cheers</div><div><br></div><div>Yassin <br><div class="gmail_quote">On 24 October 2012 22:38, Douglas Onyango <span dir="ltr"><<a href="mailto:ondouglas@gmail.com" target="_blank">ondouglas@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><p>Yassin,</p><div class="im"><br>
On Oct 25, 2012 12:59 AM, "Dr Yassin Mshana" <<a href="mailto:ymshana2003@gmail.com" target="_blank">ymshana2003@gmail.com</a>> wrote:<br>
> I am glad to have learnt something today. It seems that the limitations >are a advantage when it comes to security issues which can not be >discussed in the Open. <br>
> Security is Secret therefore one does not have to answer Questions in >the open (Oga Nii I am sorry there - no answers on security issues) the >fact is in the laboratory everything is open but when it comes to security >practice things are different!</div>
<p></p>
<p>This is what is called the: security through obscurity principle. It is also frowned upon in security circles because it doesn't make you more secure but rather hides your vulnerabilities --- and you know you can't do that forever.</p>
<p>Microsoft and Apple are some prime examples of people who worked by this principle with disappointing results at some point.....on the other had Linux/Unix is a success story of open security.....and today we all know where that has gotten them.</p>
<p>I am more of the school of thought of open security; or security by design. I think security can & should be discussed openly --- afterall, our discussion centres around principles of security rather than IP addresses or anything that low level.</p>
<p>Regards,</p>
<br>_______________________________________________<br>
AfrICANN mailing list<br>
<a href="mailto:AfrICANN@afrinic.net">AfrICANN@afrinic.net</a><br>
<a href="https://lists.afrinic.net/mailman/listinfo.cgi/africann" target="_blank">https://lists.afrinic.net/mailman/listinfo.cgi/africann</a><br>
<br></blockquote></div><br><br clear="all"><div><br></div>-- <br><div><font color="#3333ff"><i><b>Independent Consultant</b></i></font></div><div>c/o DFID-Sierra Leone</div>5 Off Spur Road, Wilberforce<br>Freetown,SIERRA LEONE<br>
Skype: yassinmshana1, Mobile:+23276926697, Fax: (+232) 22235769<br><div><b style="background-color:rgb(255,255,255)"><font color="#33cc00">Do You really NEED TO PRINT THIS?</font></b></div><div><span> </span><i> <font color="#330099">"The illiterates of the 21st century are not those who cannot read or</font></i><div>
<font color="#330099"><i> write</i><i> but those who cannot learn, relearn and unlearn" Alvin Toffler</i></font></div></div><br>
</div>