Skip to main content

Perilous

This past week there were articles all over the Internet about "The China Incident." If you have been so distracted by the unfortunate disaster in Haiti that you didn't see it, Google has threatened to pull its operations out of China because an attempt to hack it and 30 other companies occurred. Worse, Google says it has evidence pointing to the Chinese government as the source of the intrusions.

The scary part is that although initial reports implied that the hackers were looking for information on Chinese dissidents, it now seems that they were after intellectual property. This raised an interesting question: what if they installed a Trojan horse into Google's source code without stealing anything? How would you know what happened?

I spent 20 years in application development, and I know firsthand that the more complex systems can easily be in excess of 1,000,000 lines of code in size. If someone inserted 100 - even 1,000 - lines of new code as a backdoor, is a company like Google really going to notice the %0.1 difference in size? Worse, what are the bigger implications, e.g. what could they steal from users such as you or me using such a technique?

At least Google made an effort to protect itself. A recent New York Times article said that 20% of people choose their passwords from the relatively small pool of 5,000 words and variations. 1% of people use "123456" as their password, with the 2nd most popular password being "12345." While I realize that having your financial information on a computer does not impress you with the same sense of urgency for security as the old school safe deposit box did, that makes this doubly disconcerting since there is so much more data to be mined from people's personal computers than you could ever find in a single safe deposit box.

This is your personal identity at risk. My brother was the victim of identity theft several years ago. And while the damage was more limited than what you typically find in the news articles written in Wired et al, it still took him forever to straighten the situation. Imagine if all of his data were pilfered and his identity completely taken over by a rogue hacker.

Better still, imagine if your identity were completely taken over.

Don't tempt fate. You, me, and every individual are not Googles unto ourselves. We don't have the same facilities available to protect the intellectual property that is our life. This means that it is that much more important to ensure the safety of our digital selves.

Popular posts from this blog

It's Easier to Fail at DevOps than it is to Succeed

Slippery when wet Since the term DevOps was coined in Belgium back in 2009, it is impossible to avoid the term whether in discussions with colleagues or in professional trade magazines.  And during the years while this movement has gained momentum, many things have been written to describe what elements of a DevOps strategy are required for it to be successful. Yet in spite of this, there is an interesting data point worth noting: not many organizations feel there is a need for DevOps.  In a Gartner report entitled DevOps Adoption Survey Results (published in September 2015),  40%  of respondents said they had no plans to implement DevOps and 31% of respondents said they hadn't implemented it but planned to start in the 12 months after the survey was conducted. That left only 29% who had implemented DevOps in a pilot project or in production systems, which isn't a lot. "Maybe it's because there truly isn't a need for DevOps," you say.  While t...

So What is this IPaaS Stuff, Anyway?

 In my last post , I discussed how no-code/low-code platforms fulfill rapid development of business applications - addressing the needs of the Citizen Developer (a Gartner term  first used around 2009).  I also commented on how this specific objective limits their ability to provide true integration capabilities, which require the flexibility to adapt to the myriad variations of infrastructure.  This is a concern because companies often have acquired legacy systems via M&A activity while simultaneously investing in new technology solutions, resulting in a mishmash of systems with multiple ways of accessing them. In this post, I'd like to examine how the needs of the latter group are met by describing some key capabilities that are "must-haves" for any company looking to execute on a digital transformation strategy.  In order to do this, let's define who the target user base is for such a technology platform. Disclaimer:   I work for MuleSoft (a division...

Application Development Done Right

In a previous article, entitled DevOps as the Ultimate Panacea? , I described how developing code without thinking about the current needs of the end user as well as the future needs once they've become accustomed to using your application ends up not only frustrating them but also can result in customer churn and ultimately lower revenues.  In this article, I'd like to describe something simple that I came across today that shows a definite degree of effort to do quite the opposite. Recently, we had a severe snowstorm, one with blizzard-like conditions, which is unheard of in central New Jersey.  Being responsible adults, my wife and I went to the grocery store to stock up on essentials (read:  chips, chocolate, etc.) in case we get stuck at home. As we were ringing up our order, the cashier mentioned to us that the store has a mobile application.  Since both of us are in technology oriented professions, we were skeptical about the need for a grocery store mob...