[EAS] [BC] EAS Zombie Attack
Tim Stoffel
tim at knpb.org
Wed Feb 13 15:57:20 CST 2013
If we are going to go to this kind of draconian length, why not run dedicated 2 or 4 wire copper pairs to a central CAP server system and use full private key double DES encryption on the data, and require the device to be in a locked room with access logging required on the door?
No security is bad. Too much security is bad, too.
Tim Stoffel
--
Thanks Barry. That is good info and I generally agree with your assessment. Still, a few things I'd like to see in the coming days or weeks (not months):
1. EAS manufacturers (many or most who monitor this list) should:
1. If not already present, incorporate into their next software update code that nags or requires the user to alter the default factory password(s). ....
More information about the EAS
mailing list