(no title)
anonyfuss | 12 years ago
In addition, internal analytics systems will have reason to tap into data streams/events, as will content-based advertising systems.
All of these things are often designed to provide general interfaces; locking them down is done through generic privilege levels and access controls. The people managing those access controls are few, and may not even know the true purpose for the controls they've authorized. Indeed, someone could requisition the insertion of a content analysis system that was fed user data, appeared to be a legitimate deployment, and yet was actually a core service used to push data to the government.
No comments yet.