Omissis iocis, Sed quis custodiet ipsos custodes?



  


 

Hello,

This is some hosted place for storing and sharing a copy of some research observations.
Bits and peaces from long term research, into:

A
.) "Why.. the mainstream 'security' methods/standards/policies are clearly failing to actually deliver a decent protection structure."

B
.) "How.. to actually ensure a fool-proof protection structure."
       To self-evidently fully prevent: intrusions, infiltration, espionage, sabotage, data breaches/leaks,  ..and corruption of the protection structure itself."
For both ICT/virtual and physical operational aspects of our vital infrastructure and government organisations.

a) If you want to learn about Why the mainstream 'security' methods can only fail, due to a Catch-22 type pitfall in the methodology used with all of the mainstream methods/policies/standards.
Then just select the open door picture below to start exploring.
Note: If you notice anything here that you know to be incorrect, then please let me know the details so it can be corrected.

b) If you want to learn about research outcome from (B.) ,  known as a "Safeguard" method.
Then you can send a request via email.  The method details are only shared with those who have decent integrity and the "need to know", to protect our population and vital infrastructure
Note: The "Safeguard" method itself is free for use for the common good. There are no fees or rights claims attached.


Hint
:
  :( Those who dogmatically profess that "100% Secure, is not possible!" , seem to either have a knowledge 'blind spot' ..or.. ulterior motive to make people believe that the for them financially very lucrative 'security problems' can not be resolved ~ but only be endlessly mitigated by trowing money their way  without any result warranty.

  :) It is actually possible and even simple, to make such a structure "100% Secure", ..without hampering usability and without extra costs.

Its a matter of using a clear logic rules method, which not only describes how to defend specific elements of the whole structure
 by using the 2 most essential basic "secure by design" principles,
 ..but also provides the essential solid Safeguard,
   against various forms of security structure corruption. 
i.e. the method Prevents
subversive security undermining due to : coercion, bribes, blackmail, infiltration, manipulation, conflict of interest, personal greed, nepotism/favoritism, .etc..  
[See the age old wisdom quote below, about ""complicity guarantees silence""]





Ps.
it would help if you care to help a bit, with getting those self-serving bureaucrats to come to their senses
~> to stop them clinging to the clearly dysfunctional  dogmatic 'security'  methods/policies,
=> help them to adopt some form of a Safeguard method, for our common good!










..