Suggestion for a webmail application with good Hebrew Support
Danny Lieberman
dannyl at software.co.il
Tue Aug 18 16:44:07 IDT 2009
Shachar
You see - that as soon as we start talking about money, the risk assessment
discussion gets more serious.
1. Google Apps Premium is $50/user/year ( higher volume/more demanding
service levels).
Google Apps Standard is free - we use it for our community involvement
sites like www.jpbigband.org
The Google security and privacy policy is same in both cases.
2. Ask Gaby Askenazi about privacy in the MOD
You're a pro. Most of our clients don't have the foggiest idea what's
happening inside their network.
3. Use a 10kg hammer.
We have clients that insist on physical destruction of the data disk after a
network surveillance.
d
On Tue, Aug 18, 2009 at 4:21 PM, Shachar Shemesh <shachar at shemesh.biz>wrote:
> Danny Lieberman wrote:
>
> Shachar, Geoff
>
>
> b) the threat probability of one of our operations getting a US court
> injunction is so low that I don't even bother with security countermeasures.
> OTOH - the threat of dos/web defacing/site downtime/poor response time is
> high enough that we considered and eventually deployed outsourced services
> for messaging and hosting. We use slicehost, rackspace.com and Google
> Apps. Dev servers are inhouse.
>
> Your threat level rises significantly when you use free services. If you
> are going to be using Google's services for your business, my recommendation
> is that you find a route in which you pay them for it. The logic is that by
> paying them, you are creating accountability of them to you. Many of the
> privacy concerns diminish significantly as a result.
>
> I'll add that, specifically with Google, the amount of concentrated
> cross-referencable personal info is what bothers me the most.
>
> >>> Apropos - My personal estimate is that the probability of a privacy
> breach is higher in the Israeli Ministry of Defense than in GooglePlex.
>
> Not when my own servers are involved. At least not without my knowledge.
>
>
> d) We deploy security countermeasures to protect assets:
> 0) We don't use Google docs, Never.
>
> So you are, essentially, saying that you agree with me to a degree, but
> don't go quite as far.
>
> 3) we physically destroy hard disks (it's fun...)
>
> That I'm curios about. What do you specifically do to destroy the hard
> disk?
>
> The way I see it, either you believe that "recover seven generations" is
> not possible (like some do), in which case just do "dd if=/dev/urandom
> of=/dev/sdb" followed by "dd if=/dev/zero of=/dev/sdb" (or just settle for
> the later), or you believe that it is possible, in which case the only
> solution I know of is melting the drive's plates. Personally, I don't have
> any way to do the later, so I just do the former and hope that my attackers
> don't have the $100K+ it allegedly requires to recover the data.
>
> Shachar
>
> --
> Shachar Shemesh
> Lingnu Open Source Consulting Ltd.http://www.lingnu.com
>
>
--
Danny Lieberman
-------------------------------------------------------------------------------------------------
Protect your data: http://www.software.co.il
Twitter: http://twitter.com/onlyjazz
Skype: dannyl50
Warsaw:+48-79-609-5964
Israel: +972 8 9701485
Mobile: +972 - 54 447 1114
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.cs.huji.ac.il/pipermail/linux-il/attachments/20090818/8b79edb4/attachment.html>
More information about the Linux-il
mailing list