In my work as a software architect and security expert, I always consider boundary conditions such as malicious input as opposed to normal behavior. I also consider innocuous errors that could lead to disastrous consequences.
I immediately applied this approach to the NSA Prism program and came up with 3 scenarios:
- Innocent mistake and courteous response that could make me a person of interest or worse.
- Message embedded in a collect call request.
- A business or vengeance opportunity. Continue reading