Going Around Security
Computer systems don’t exist in a vacuum:
- Attack the surrounding systems.
- “Dumpster diving”.
- Social engineering.
System must be usable by real people -- how do you recover from lost keys, forgotten passwords, etc.
Must bound or relocate insecurity -- it can’t be eliminated.