« The Economics of Finding and Fixing Vulnerabilities in Distributed Systems | Main | Confidentiality, Integrity, Availability - Pick Any Two »

Comments

Dave T

I wonder if we'll ever find out how the data was retrieve (and if it actually was retrieved). This small amount of data could have been an inside job. The attacker could have simply written the information down on paper, stuck it in his/her pocket and walked out.

chris

you are welcome

nice use of mom's ssn!

The comments to this entry are closed.