Talk:Worst cases: Difference between revisions

    From Consumerium development wiki R&D Wiki
    m (typo)
    (think of it as a security problem - transparent vs. obscure)
    Line 1: Line 1:
    I'm not sure at all if it's wise to '''publicly''' list the sensitive points which can be used to haul consumerium out of the way for a more [[w:productivism|productionism orientated]] system with similar features, but lacking the observance of [[Features|corporate social responsibility issues]].[[User:Juxo|Juxo]] 17:25 Jun 22, 2003 (EEST)
    I'm not sure at all if it's wise to '''publicly''' list the sensitive points which can be used to haul consumerium out of the way for a more [[w:productivism|productionism orientated]] system with similar features, but lacking the observance of [[Features|corporate social responsibility issues]].[[User:Juxo|Juxo]] 17:25 Jun 22, 2003 (EEST)
    :Well, there are two attitudes 1. assume that you are a genius who can figure out all this in advance without ever writing it down or working out weak points "security by obscurity" 2. assume that you need to brainstorm about the problems that can be visited on you in a competitive world, by those who seek to subvert, and, that you can best discourage them by working out a robust solution, wit good answers to all the [[threats]] and [[worst cases]]  You have no non-public way to do this, and surely you would rather be notified of potential attacks or competitors this way than by having them suddenly appear, exploiting flaws in the [[licenses]] and [[audit]] process that you never thought of, or discussed?  Same issue as computer security - you can be transparent or try to hide flaws in the hope that this hiding will make you obscure.  But if it does, you aren't having any influence.  So the winning strategy is probably the more open one.

    Revision as of 01:09, 23 June 2003

    I'm not sure at all if it's wise to publicly list the sensitive points which can be used to haul consumerium out of the way for a more productionism orientated system with similar features, but lacking the observance of corporate social responsibility issues.Juxo 17:25 Jun 22, 2003 (EEST)

    Well, there are two attitudes 1. assume that you are a genius who can figure out all this in advance without ever writing it down or working out weak points "security by obscurity" 2. assume that you need to brainstorm about the problems that can be visited on you in a competitive world, by those who seek to subvert, and, that you can best discourage them by working out a robust solution, wit good answers to all the threats and worst cases You have no non-public way to do this, and surely you would rather be notified of potential attacks or competitors this way than by having them suddenly appear, exploiting flaws in the licenses and audit process that you never thought of, or discussed? Same issue as computer security - you can be transparent or try to hide flaws in the hope that this hiding will make you obscure. But if it does, you aren't having any influence. So the winning strategy is probably the more open one.