<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Hackers on Shafiq Alibhai</title>
    <link>https://www.shafiq.in/zh/tags/hackers/</link>
    <description>Recent content in Hackers on Shafiq Alibhai</description>
    <generator>Hugo</generator>
    <language>zh-CN</language>
    <copyright>© 2009-2026 All rights reserved.</copyright>
    <lastBuildDate>Tue, 23 Feb 2010 10:00:02 +0000</lastBuildDate>
    <atom:link href="https://www.shafiq.in/zh/tags/hackers/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Hack Proof Encryption ? read on…</title>
      <link>https://www.shafiq.in/zh/blog/hack-proof-encryption-read-on/</link>
      <pubDate>Tue, 23 Feb 2010 10:00:02 +0000</pubDate>
      <guid>https://www.shafiq.in/zh/blog/hack-proof-encryption-read-on/</guid>
      <description>&lt;p&gt;The point of using encryption and other cryptographic methods isn&amp;rsquo;t to create a 100-percent foolproof, uncrackable system. The only positively unhackable system is a computer that&amp;rsquo;s turned off, and even that isn&amp;rsquo;t a guarantee because someone might be able to physically walk up to it, turn it on, and hack it. The point of all this work is to make it so difficult to get at sensitive data that hackers don&amp;rsquo;t even try, or they move on after a few failed attempts.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
