Tuesday, December 4, 2012

The Rise of Feudal Computer Security

Hugh Pickens writes "In the old days, traditional computer security centered around users. However, Bruce Schneier writes that now some of us have pledged our allegiance to Google (using Gmail, Google Calendar, Google Docs, and Android phones) while others have pledged allegiance to Apple (using Macintosh laptops, iPhones, iPads; and letting iCloud automatically synchronize and back up everything) while others of us let Microsoft do it all. 'These vendors are becoming our feudal lords, and we are becoming their vassals. We might refuse to pledge allegiance to all of them -- or to a particular one we don't like. Or we can spread our allegiance around. But either way, it's becoming increasingly difficult to not pledge allegiance to at least one of them.' Classical medieval feudalism depended on overlapping, complex, hierarchical relationships. Today we users must trust the security of these hardware manufacturers, software vendors, and cloud providers and we choose to do it because of the convenience, redundancy, automation, and shareability. 'In this new world of computing, we give up a certain amount of control, and in exchange we trust that our lords will both treat us well and protect us from harm (PDF). Not only will our software be continually updated with the newest and coolest functionality, but we trust it will happen without our being overtaxed by fees and required upgrades.' In this system, we have no control over the security provided by our feudal lords. Like everything else in security, it's a trade-off. We need to balance that trade-off. 'In Europe, it was the rise of the centralized state and the rule of law that undermined the ad hoc feudal system; it provided more security and stability for both lords and vassals. But these days, government has largely abdicated its role in cyberspace, and the result is a return to the feudal relationships of yore,' concludes Schneier, adding that perhaps it's time for government to create the regulatory environments that protect us vassals. 'Otherwise, we really

[![](http://a.fsdn.com/sd/twitter_icon_large.png)](http://twitter.com/home?status=The+Rise+of+Feudal+Computer+Security%3A+http%3A%2F%2Fbit.ly%2FUdjeLN) [![](http://a.fsdn.com/sd/facebook_icon_large.png)](http://www.facebook.com/sharer.php?u=http%3A%2F%2Fit.slashdot.org%2Fstory%2F12%2F12%2F04%2F2018204%2Fthe-rise-of-feudal-computer-security%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook) [![Share on Google+](http://www.gstatic.com/images/icons/gplus-16.png)](http://plus.google.com/share?url=http://it.slashdot.org/story/12/12/04/2018204/the-rise-of-feudal-computer-security?utm_source=slashdot&utm_medium=googleplus)

[Read more of this story](http://it.slashdot.org/story/12/12/04/2018204/the-rise-of-feudal-computer-security?utm_source=rss1.0moreanon&utm_medium=feed) at Slashdot.

![](http://slashdot.feedsportal.com/c/35028/f/647410/s/26439f54/mf.gif)

[![](http://da.feedsportal.com/r/151883028393/u/49/f/647410/c/35028/s/26439f54/a2.img)](http://da.feedsportal.com/r/151883028393/u/49/f/647410/c/35028/s/26439f54/a2.htm)![](http://pi.feedsportal.com/r/151883028393/u/49/f/647410/c/35028/s/26439f54/a2t.img)![](http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/c4lhM4L2dAM)

URL: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/c4lhM4L2dAM/story01.htm

No comments:

Post a Comment