fix: myriad typos and issues pt 2

This commit is contained in:
Cory Dransfeldt 2023-05-06 19:02:30 -07:00
parent be92f3bdf0
commit b0aa0d6948
No known key found for this signature in database
50 changed files with 120 additions and 69 deletions

View file

@ -7,7 +7,7 @@ tags: ['security']
**[Bruce Schneier:](https://www.schneier.com/blog/archives/2016/03/data_is_a_toxic.html)**
> We can be smarter than this. We need to regulate what corporations can do with our data at every stage: collection, storage, use, resale and disposal. We can make corporate executives personally liable so they know there's a downside to taking chances. We can make the business models that involve massively surveilling people the less compelling ones, simply by making certain business practices illegal.<!-- excerpt -->
> We can be smarter than this. We need to regulate what corporations can do with our data at every stage: collection, storage, use, resale and disposal. We can make corporate executives personally liable, so they know there's a downside to taking chances. We can make the business models that involve massively surveilling people the less compelling ones, simply by making certain business practices illegal.<!-- excerpt -->
> Data is a toxic asset. We need to start thinking about it as such, and treat it as we would any other source of toxicity. To do anything else is to risk our security and privacy.
@ -15,4 +15,4 @@ This piece by Bruce Schneier is worth revisiting in light of [yesterday's Equifa
There will be more breaches, and we'll have to deal with the fallout, but we shouldn't be apathetic about it. Any company that collects that much data about the public should be held to higher standards when storing it (or, better yet, shouldn't store it at all). An insincere apology and a free year of some service provided by the company that failed to protect our data in the first place isn't good enough.
[^1]: They might consider starting by patching [nine year old vulnerabilities before they're exploited](https://qz.com/1073221/the-hackers-who-broke-into-equifax-exploited-a-nine-year-old-security-flaw/).
[^1]: They might consider starting by patching [nine-year-old vulnerabilities before they're exploited](https://qz.com/1073221/the-hackers-who-broke-into-equifax-exploited-a-nine-year-old-security-flaw/).