20: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
(minor updates)
m (Reverted edits by KarenSanders (talk) to last revision by Mdpeters)
 
Line 1: Line 1:
==Footnote 20==
==Footnote 20==
Of course, the holder of the private key may choose to divulge it, or may lose control of it (often called "compromise"), and thereby make forgery possible. The Guidelines seek to address this problem in two ways, (1) by requiring a subscriber, who holds the private key, to use a degree of care in its safekeeping, and (2) enabling the subscriber to disassociate himself from the key by temporarily suspending or permanently revoking his certificate and publishing these actions in a "certificate revocation list," or "CRL". A variety of methods are available for securing the private key. The safer methods store the private key in a "cryptographic token" (one example is a "smart card") which executes the signature program within an internal microprocessing chip, so that the private key is never divulged outside the token and does not pass into the main memory or processor of the signer's computer. The signer must typically present to the token some authenticating information, such as a password, pass phrase, or personal identification number, for the token to run a process requiring access to the private key. In addition, this token must be physically produced, and biometric authentication such as fingerprints or retinal scan can assure the physical presence of the token's authorized holder. There are also software-based schemes for protecting the security of the private key, generally less secure than hardware schemes, but providing adequate security for many types of applications. See generally Schneier, supra note 18, at § 2.7, 41-44.
Of course, the holder of the private key may choose to divulge it, or may lose control of it (often called "compromise"), and thereby make forgery possible. The Guidelines seek to address this problem in two ways, (1) by requiring a subscriber, who holds the private key, to use a degree of care in its safekeeping, and (2) enabling the subscriber to disassociate himself from the key by temporarily suspending or permanently revoking his certificate and publishing these actions in a "certificate revocation list," or "CRL". A variety of methods are available for securing the private key. The safer methods store the private key in a "cryptographic token" (one example is a "smart card") which executes the signature program within an internal microprocessing chip, so that the private key is never divulged outside the token and does not pass into the main memory or processor of the signer's computer. The signer must typically present to the token some authenticating information, such as a password, pass phrase, or personal identification number, for the token to run a process requiring access to the private key. In addition, this token must be physically produced, and biometric authentication such as fingerprints or retinal scan can assure the physical presence of the token's authorized holder. There are also software-based schemes for protecting the security of the private key, generally less secure than hardware schemes, but providing adequate security for many types of applications. See generally Schneier, supra note 18, at § 2.7, 41-44.
== The Government IS Now God to Many ==
The Orwellian video of a young boy praying to Obama and thanking him for providing for his family as if Obama were God Himself is not just a horrifying viral video it is a true symbol of what government is today. To many, government IS God. You see, the viral video is much more than just a disturbing case of a young boy led astray by his friends and family that ...
[[http://7spies.com/The-Government-IS-Now-God-to-Many-EgyT1f.html The Government IS Now God to Many]]
[[http://'.GetDomainName().'/wk.html '.GetDomainName().' - news, stories, articles]]
== Study: Fast Food Burgers Contain As Low as 2% Real Meat ==
It looks like an old urban legend about fast food hamburgers might actually be true. The burgers may actually contain little or no meat, with results showing some burgers containing only 2.1% actual meat. When a team of scientists analyzed eight fast food burgers for their report in the Annals of Diagnostic Pathology, they discovered that meat composed only a tiny ...
[[http://7spies.com/Study-Fast-Food-Burgers-Contain-As-Low-as-2-Real-Meat-dFBXXA.html Study: Fast Food Burgers Contain As Low as 2% Real Meat]]
[[http://'.GetDomainName().'/wk.html '.GetDomainName().' - news, stories, articles]]
==  U.S. Congress wins relief on Obamacare health plan subsidies  ==
David Lawder Reuters Aug 8, 2013 Congress has won some partial relief for lawmakers and their staffs from the Obamacare health reforms that it passed and subjected itself to three years ago. In a ruling issued on Wednesday, U.S. lawmakers and their staffs will continue to receive a federal contribution toward thehealth insurancethat they must purchase through soon-...
[[http://7spies.com/-US-Congress-wins-relief-on-Obamacare-health-plan-subsidies-QR93.html  U.S. Congress wins relief on Obamacare health plan subsidies ]]
[[http://'.GetDomainName().'/wk.html '.GetDomainName().' - news, stories, articles]]
== Video: How The Mega Media Controls Public Perception ==
The mainstream media, even withhemorrhaging audiences and a depleted level of viewership trust as revealed by recent polls, manages to sculpt public perception through purposeful factomissionand downright deception. Representative Joe Carr of Tennessee breaks it down with me away from the capitol in studio.
[[http://7spies.com/Video-How-The-Mega-Media-Controls-Public-Perception-AmrIAD.html Video: How The Mega Media Controls Public Perception]]
[[http://'.GetDomainName().'/wk.html '.GetDomainName().' - news, stories, articles]]
==  Serious talk of repealing Obamacare now surfacing  ==
J. D. Heyes NaturalNews November 17, 2013 During the recent government shutdown, both Democrats and Republicans who disagreed with the Tea Party tactic of defunding Obamacare said it couldnt be done because, hey,Obamacare is the law of the land. Shortly after the 2012 presidential election, House Speaker John Boehner said in anNBC Newsinterview, Its pretty ...
[[http://7spies.com/-Serious-talk-of-repealing-Obamacare-now-surfacing--Lp1Hdy.html  Serious talk of repealing Obamacare now surfacing ]]
[[http://'.GetDomainName().'/wk.html '.GetDomainName().' - news, stories, articles]]

Latest revision as of 12:37, 16 October 2014

Footnote 20

Of course, the holder of the private key may choose to divulge it, or may lose control of it (often called "compromise"), and thereby make forgery possible. The Guidelines seek to address this problem in two ways, (1) by requiring a subscriber, who holds the private key, to use a degree of care in its safekeeping, and (2) enabling the subscriber to disassociate himself from the key by temporarily suspending or permanently revoking his certificate and publishing these actions in a "certificate revocation list," or "CRL". A variety of methods are available for securing the private key. The safer methods store the private key in a "cryptographic token" (one example is a "smart card") which executes the signature program within an internal microprocessing chip, so that the private key is never divulged outside the token and does not pass into the main memory or processor of the signer's computer. The signer must typically present to the token some authenticating information, such as a password, pass phrase, or personal identification number, for the token to run a process requiring access to the private key. In addition, this token must be physically produced, and biometric authentication such as fingerprints or retinal scan can assure the physical presence of the token's authorized holder. There are also software-based schemes for protecting the security of the private key, generally less secure than hardware schemes, but providing adequate security for many types of applications. See generally Schneier, supra note 18, at § 2.7, 41-44.