Skip to main content

Perilous

This past week there were articles all over the Internet about "The China Incident." If you have been so distracted by the unfortunate disaster in Haiti that you didn't see it, Google has threatened to pull its operations out of China because an attempt to hack it and 30 other companies occurred. Worse, Google says it has evidence pointing to the Chinese government as the source of the intrusions.

The scary part is that although initial reports implied that the hackers were looking for information on Chinese dissidents, it now seems that they were after intellectual property. This raised an interesting question: what if they installed a Trojan horse into Google's source code without stealing anything? How would you know what happened?

I spent 20 years in application development, and I know firsthand that the more complex systems can easily be in excess of 1,000,000 lines of code in size. If someone inserted 100 - even 1,000 - lines of new code as a backdoor, is a company like Google really going to notice the %0.1 difference in size? Worse, what are the bigger implications, e.g. what could they steal from users such as you or me using such a technique?

At least Google made an effort to protect itself. A recent New York Times article said that 20% of people choose their passwords from the relatively small pool of 5,000 words and variations. 1% of people use "123456" as their password, with the 2nd most popular password being "12345." While I realize that having your financial information on a computer does not impress you with the same sense of urgency for security as the old school safe deposit box did, that makes this doubly disconcerting since there is so much more data to be mined from people's personal computers than you could ever find in a single safe deposit box.

This is your personal identity at risk. My brother was the victim of identity theft several years ago. And while the damage was more limited than what you typically find in the news articles written in Wired et al, it still took him forever to straighten the situation. Imagine if all of his data were pilfered and his identity completely taken over by a rogue hacker.

Better still, imagine if your identity were completely taken over.

Don't tempt fate. You, me, and every individual are not Googles unto ourselves. We don't have the same facilities available to protect the intellectual property that is our life. This means that it is that much more important to ensure the safety of our digital selves.

Popular posts from this blog

It's Easier to Fail at DevOps than it is to Succeed

Slippery when wet Since the term DevOps was coined in Belgium back in 2009, it is impossible to avoid the term whether in discussions with colleagues or in professional trade magazines.  And during the years while this movement has gained momentum, many things have been written to describe what elements of a DevOps strategy are required for it to be successful. Yet in spite of this, there is an interesting data point worth noting: not many organizations feel there is a need for DevOps.  In a Gartner report entitled DevOps Adoption Survey Results (published in September 2015),  40%  of respondents said they had no plans to implement DevOps and 31% of respondents said they hadn't implemented it but planned to start in the 12 months after the survey was conducted. That left only 29% who had implemented DevOps in a pilot project or in production systems, which isn't a lot. "Maybe it's because there truly isn't a need for DevOps," you say.  While t...

So What is this IPaaS Stuff, Anyway?

 In my last post , I discussed how no-code/low-code platforms fulfill rapid development of business applications - addressing the needs of the Citizen Developer (a Gartner term  first used around 2009).  I also commented on how this specific objective limits their ability to provide true integration capabilities, which require the flexibility to adapt to the myriad variations of infrastructure.  This is a concern because companies often have acquired legacy systems via M&A activity while simultaneously investing in new technology solutions, resulting in a mishmash of systems with multiple ways of accessing them. In this post, I'd like to examine how the needs of the latter group are met by describing some key capabilities that are "must-haves" for any company looking to execute on a digital transformation strategy.  In order to do this, let's define who the target user base is for such a technology platform. Disclaimer:   I work for MuleSoft (a division...

Overcoming Imposter Syndrome

Imposter Syndrome is a cruel partner in your professional journey.  If you're not familiar with the term, it is essentially the feeling that you do not belong in a particular profession or that you do not deserve a specific role or set of responsibilities.  (You may read more in the Wikipedia article .)  I did not hear the term myself until I participated in a mentoring group for young employees at my current job - some of the young employees said they had this, and I won't deny a bit of surprise when I read what it is. If you feel this way, you're obviously not alone.  A good friend of mine suffers from this in no small amount in spite of the fact that she's an upper mid-level manager at her company with an organization of approximately 40 people reporting to her.  She feels this way because she never completed college, but fails to realize that her hard work and dedication to being the best that she can be is why she has been repeatedly promoted through the ra...