InvestorsHub Logo
Followers 35
Posts 5775
Boards Moderated 0
Alias Born 07/22/2003

Re: ExPatriate57 post# 235353

Wednesday, 11/20/2013 2:26:55 PM

Wednesday, November 20, 2013 2:26:55 PM

Post# of 249465
"You also are giving no credit to "Shoulder Surfing" or Password Cross site usage."

But I did give credit to shoulder surfing. I then stated the intruder would have to gain posssession of the device.

You and I don't disagree that PIN sniffing is feasible on TPM-enabled devices, I'm emphasizing the point that stolen device scenarios account probably account for a very low% of network intrusions. My assumption is intrusions generally occur using unauthorized devices. I stand to be corrected.

"But I take heartfelt exception that " 'IT Guys' don't get it"."

Hey, that wasn't directed at YOU and I'm sorry if you took it that way; perhaps you didn't. Probably a better way to express my sentiment would have been "many enterprise IT folks aren't aware of trusted computing". Perhaps you disagree; see more below.

"But I take heartfelt exception that " 'IT Guys' don't get it"."

"It's a dismissive and arrogant statement."

"They most certainly do, and much better than your average layman on a message board."

My profession puts me in the convention business environmemt here in Las Vegas. Actually I have a great deal of experience introducing the TC concept over many years to my enterprise IT customers...tons of them. For a layperson to enterprise IT my awareness of and understanding of TC including the challenges implementing it in existing enterprise network infrastructure is exceptionally high for a layperson. Try me on some of the challenges. Name some and we'll talk.

A better way to put it is not "they don't get it" but "many are not aware of it".
Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.