Skip to main content

View Diary: Amazon Caught Deleting Books on Customer Kindles (216 comments)

Comment Preferences

  •  If you're going to be that paranoid (0+ / 0-)

    then I'll define a secure computer for you:

    A secure computer is one that is powered down, disconnected from the network encased in the center of a 10' X 10' X 10' concrete cube, and buried  at least 1000' under ground.

    Like I said, if you don't like the TOS on the Kindle, the EULA on any OS or proprietary hardware, the good news is there are no laws requiring you to purchase or use any of it.

    It's just a damn e-book reader with a web browser and the ability to purchase e-books online for crying out loud. It's not like you're keeping your SSN or employment records on it.

    When the power of love overcomes the love of power the world will know peace. -Jimi Hendrix -6.0 -5.33

    by Cali Techie on Mon Jul 20, 2009 at 12:24:41 PM PDT

    [ Parent ]

    •  Or one can keep data on a hardened Linux server (0+ / 0-)

      that's properly firewalled so it's only accessible physically or through a vpn with two-factor authentication.

      Of course how data is secured should be proportional to the sensitivity of the data.  Your right, since nothing on Kindle is sensitive, it's not much of an issue.  Even with data it's just convent for me to have (such as a book I'm reading) I don't want anyone else deleting it remotely.  If you don't mind Amazon deleting stuff off your Kindle, that's your business.

      "I object to violence because when it appears to do good, the good is only temporary; the evil it does is permanent."

      by Futuristic Dreamer on Mon Jul 20, 2009 at 01:09:31 PM PDT

      [ Parent ]

      •  A computer (1+ / 0-)
        Recommended by:
        Futuristic Dreamer

        powered on and connected to a network is by definition not secure.

        Security boils down to a compromise because a totally secure machine is unusable. Your definition can be applied to any platform including Windows, Solaris, BSD, MacOS, HPUX, AIX, IRIX, etc. I've been in this business a long time and I specialize in host and network security. I've been doing it long enough to know host OS choice is mostly a religious argument. Any platform can be sufficiently hardened to make it exceedingly difficult to obtain any of the information it's hosting without authorization. I'm a Solaris, Linux, BSD, MacOS guy myself, and have been for quite a few years, so I'm not exactly a Microsoft fan.

        BTW, most firewalls including those included in open source distros can be defeated. Open source is particularly vulnerable because the code is available for review and inspection.

        Open source is not a panacea. The most secure networks contain elements using both open source and proprietary code.

        When the power of love overcomes the love of power the world will know peace. -Jimi Hendrix -6.0 -5.33

        by Cali Techie on Mon Jul 20, 2009 at 02:36:18 PM PDT

        [ Parent ]

Subscribe or Donate to support Daily Kos.

Click here for the mobile view of the site