Who doesn’t like making fun of Mensa? My brother is in Mensa and even he likes doing it on occasion. Jeff Atwood likes to ridicule the security practices on the Mensa America website. Really, who could resist it?
Do you have a coworker in Mensa? Then try this, fire up you favorite packet sniffer and then put his web mail address at this web page. Then…
Legal Disclaimer: this blog does not condone or encourage hacking of any sort. Nor does it encourage posting poorly worded scatological comments to the Mensa web site while logged in using a stolen password.
I had recently mentioned MyCMDB here and speculated that perhaps this might be an example of what Enterprise 2.0 could really mean. The IT Skeptic, on the other hand, has a more colorful and skeptical view on the matter (hat tip to Ryan Shopp).
There are a lot of parallels to between a CMDB and an IdM system, so it will be interesting to watch how MyCMDB fairs. MyCMDB could be the canary in the coal mine for applying Web 2.0/Social Networking to IdM.
Bruce Schneier warns about an innocuous sounding idea called Digital Manners Policy. While some of the ideas sound interesting and address some serious problems, the difficulty in getting this right could not be overstated. From Bruce Schneier’s article:
The possibilities are endless, and very dangerous. Making this work involves building a nearly flawless hierarchical system of authority. That’s a difficult security problem even in its simplest form. Distributing that system among a variety of different devices — computers, phones, PDAs, cameras, recorders — with different firmware and manufacturers, is even more difficult. Not to mention delegating different levels of authority to various agencies, enterprises, industries and individuals, and then enforcing the necessary safeguards.
Once we go down this path — giving one device authority over other devices — the security problems start piling up. Who has the authority to limit functionality of my devices, and how do they get that authority? What prevents them from abusing that power? Do I get the ability to override their limitations? In what circumstances, and how? Can they override my override?
Hopefully this idea will stay in the lab where it belongs.