[EAS] [BC] EAS Zombie Attack

Tim Stoffel tim at knpb.org
Wed Feb 13 15:57:20 CST 2013


If we are going to go to this kind of draconian length, why not run dedicated 2 or 4 wire copper pairs to a central CAP server system and use full private key double DES encryption on the data, and require the device to be in a locked room with access logging required on the door?

No security is bad. Too much security is bad, too.

Tim Stoffel

--

Thanks Barry.  That is good info and I generally agree with your assessment.  Still, a few things I'd like to see in the coming days or weeks (not months):

1. EAS manufacturers (many or most who monitor this list) should:

 1. If not already present, incorporate into their next software update code that nags or requires the user to alter the default factory password(s).  ....



More information about the EAS mailing list