I miss read the title as:
‘The trinity of IRA security explained’.
I expected a detailed piece on Knee-Capping, Intimidation and Bombing...
Which I could follow up with a query for the I.T. angle...
In my defence, Paris would have been confused, too.
The trinity of RIA security RE-explained
The trinity of RIA security can best be summed up as:
Zip, Nada, Zilch.
We've known this ever since Active-X was first deployed. Here's Microsoft's "First immutable law of computer security":
"Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore."
Here's DaveK's corollorary to the first immutable law of computer security:
> If you let remote websites execute code on your computer, it's not your computer any more.
When combined with DaveK's axiom of rich internet application security:
> Microsoft invented Active-X /so/ that remote websites can execute code on your computer.
It leads us to DaveK's syllogisms of computer security:
>1. If you let Microsoft execute code on your computer, it's not your computer any more.
>2. Microsoft are the "bad guys".
- Review Apple iPhone 6: Looking good, slim. How about... oh, your battery died
- Review + Vid Apple iPhone 6 Plus: What a waste of gorgeous pixel density
- +Comment EMC, HP blockbuster 'merger' shocker comes a cropper
- Moon landing was real and WE CAN PROVE IT, says Nvidia
- Apple's iPhone 6 first-day sales are MEANINGLESS, mutters analyst