And in order to keep the system stable for the “user” a key to the various changes will have to be made. Such a complex issue and it won’t take 2 weeks to crack. Then we will be back to the same old war of Update system, wait til its cracked, update again.
The only way to effectively eliminate leaking is don’t store it online. Or more importantly try a closed network. That system can easily transmit to an open system without vital info being at risk.
It will take about 5 days for the frustration to turn a hacker’s focus from theft of information to how to cause a denial of service attack that triggers a continuous reconfiguration ceasing business. At which time good old fashiond firewalls, qos, and human brain power will come to bare… It is an interesting theory but like most things that are overly complex, this widget will fail…
And in order to keep the system stable for the “user” a key to the various changes will have to be made. Such a complex issue and it won’t take 2 weeks to crack. Then we will be back to the same old war of Update system, wait til its cracked, update again.
The only way to effectively eliminate leaking is don’t store it online. Or more importantly try a closed network. That system can easily transmit to an open system without vital info being at risk.
It will take about 5 days for the frustration to turn a hacker’s focus from theft of information to how to cause a denial of service attack that triggers a continuous reconfiguration ceasing business. At which time good old fashiond firewalls, qos, and human brain power will come to bare… It is an interesting theory but like most things that are overly complex, this widget will fail…