diff --git a/README.org b/README.org index 67ee75c..dea18b8 100644 --- a/README.org +++ b/README.org @@ -400,6 +400,17 @@ structurally insufficient to be the /foundation/ of our approach. *** Blocklists, allow-lists, and perimeter security +#+BEGIN_QUOTE + "With tools like access control lists and firewalls, we engage in + 'perimeter defense', which is more correctly described as 'eggshell + defense'. It is like an eggshell for the following reason: while an + eggshell may seem pretty tough when you tap on it, if you can get a + single pinhole anywhere in the surface, you can suck out the entire + yoke. No wonder cybercrackers laugh at our silly efforts to defend + ourselves. We have thrown away most of our chances to defend + ourselves before the battle even begins." + -- Marc Stiegler, [[http://www.skyhunter.com/marcs/ewalnut.html][E in a Walnut]] +#+END_QUOTE *** Access Control Lists