The Cuckoo's Egg
Rate it:
Open Preview
Kindle Notes & Highlights
Read between August 28 - September 11, 2021
6%
Flag icon
Collect raw data and throw away the expected. What remains challenges your theories.
8%
Flag icon
Gnu was the hole in our system’s security. A subtle bug in an obscure section of some popular software. Installed blindly by our systems programmers, we’d never thought that it might destroy our whole system’s security.
15%
Flag icon
Just like genetic diversity, which prevents an epidemic from wiping out a whole species at once, diversity in software is a good thing.
21%
Flag icon
Maybe random passwords, obnoxious and dissonant, are more secure.
33%
Flag icon
The hacker didn’t succeed through sophistication. Rather he poked at obvious places, trying to enter through unlocked doors. Persistence, not wizardry, let him through.
49%
Flag icon
Bob realized that damage wasn’t measured in dollars ripped off, but rather in trust lost. He didn’t see this as fun and games, but a serious assault on a open society.
60%
Flag icon
By analyzing public data with the help of computers, people can uncover secrets without ever seeing a classified database.
69%
Flag icon
But more important, my research was finished. Five months ago, I asked myself, “How come my accounts are imbalanced by 75 cents?” That question had led me across the country, under the ocean, through defense contractors and universities, to Hannover, Germany.
74%
Flag icon
“Any system can be insecure. All you have to do is stupidly manage it.”
87%
Flag icon
Yet if we didn’t change every password, we couldn’t be sure that some other hacker might not have purloined an account. All it takes is one stolen account.
88%
Flag icon
I pondered how I would now spend my time, now that my life wasn’t scheduled around the whims of some faceless foe from overseas.
89%
Flag icon
I knew the whats and the hows. I wanted to know the who’s and whys. * In truth, German telephone
93%
Flag icon
The computer has become a common denominator that knows no intellectual, political, or bureaucratic bounds;
96%
Flag icon
The obvious way to prevent viruses is to avoid exchanging programs. Don’t take candy from strangers—don’t accept untrusted programs. By keeping your computer isolated from others, no virus program can infect it.
99%
Flag icon
Diversity, then, works against viruses.