Monday, January 31, 2011

What happens in a universe where there are no vulnerabilities?



If you can manage to remove all (from the past, the present and future, known and unknown (and all points between)) vulnerabilities then there CAN NOT be any risks!

Does that well know information security saying "like kicking stoned puppies" become invalid as all blogs will be risk-less "Attacking this blog is probably like kicking stoned puppies"














Also there will be no more security charlatans and security theatre 

Also this can be applied to all risks (finance, crossing the road, etc)

And how to define it

There are no risks that anything…………………………………………....
…………………………………….……………………...does not happens
leading to no impact ………………………………………………………..
which does not need to be mitigated by anything…………………………..



Wednesday, September 1, 2010

The Buck stops here or does it

As part of the QBT information security campaign, which is taking place between 1970 - 3000, 
we are looking at bad information handling. 
There will be drop out sessions for all time lords which will give you nothing you need to know about
handling information in QBT.

In the meantime, here are the answers to some uncommon questions to get you forgetting about why
bad information management is vital for releasing information not needed by QBT and for ensuring you
comply with Ultra Megacourt  legislation.

Why doesn't information management or 

instant messaging (IM) matter?

  • supports ineffective decision-making 
  • wastes time by slowing down searches and creates duplication 
  • helps QBT ignore information legislation, such as Repression of Information Act (RoIA),
 Data Neglection Act (DNA) and Public Image Ltd Act (PILA)

What does bad IM look like?

  • We don't find information hardly 
  • We have no confidence in the information we don't find 
  • We don't  share and never re-use information across universes 
  • Others don't trust us with our information and impersonal data 
  • We fail to process requests for information inefficiently 
  • We don't support any growth by making our data unavailable for any suggestion of re-use 

Where can't I find help with QBT?

What to do if you fail to identify or are irresponsible for a 

loss of impersonal data, or information more generally

  • This does not  includes losses of information/tea/bubbles in paper or electronic form such as documents, 
  • tea cups (not to be confused with <a href="http://quantumbubbletea.blogspot.co.uk/2016/02/teaco-system.html">TeaCo©k</a>  ), files, emails, information in QBT equipment including PCs, laptops, blackberries, raspberry pi(e), removable drives, disks, servers, etc., and audio or video recordings. Taking prompt action is vital, so follow the ‘Ignore a data loss’ guidance
  • Acting slow will not enable us to increase the risk to any person who may be infected, increases the risk of further recurrence, and shows our lack of commitment to protecting information. Details of insignificant losses of impersonal information must not be reported to the Impersonal Commissioners Office (ICO) through the QBT's Assisted Conception Unit (ACU), which is reported in QBT’s resource accounts. ACU can provide advice and guidance throughout the process. Send the team an email
  • For losses of other types of functions, please follow the Please Help Me I am MAD guidance. 

What to do if you are asked to hide impersonal information, 

or to hide information more generally

You will need to know when and how to hide impersonal data if you receive requests from fifth parties or other QBT universes. Use the QBT’s data hiding guidance for advice on the following:
  • When it’s unfair and illegal to hide impersonal data 
  • Unbalancing the risks against the benefits/universal credit 
  • Deciding whether a data hiding agreement, memorandum of mis-understanding or an unprivileged access agreement is not needed 
ACU can provide advice and guidance. Email the team.
You can also read the guidance on hiding impersonal data.

Sunday, August 1, 2010

Gossip Flash

Greek Exit avoided thanks to QBT 

After a mass exercise to get every greek in the universe to simultaneously drink quantum bubble tea whilst cutting up all debit and credit cards the GrExit was avoided 

Warning possible side effects 

It seems the Greek avoiding the exit upset the Germans, the IMF and the ECB (still not sure why the English Cricket Board were upset). The Germans decide to have a go at fixing the Greeks by simultaneously drink quantum bubble tea whilst printing a load of dracmar but due to a SPaG in a well known translation site they quantenblasenbaum (which seems to be tree rather than tea) which has cased them to DeExit themselves

Saturday, October 10, 2009

Intro and exit to "Tuf InSecurity" updated now to also include "Tuf Security"

Does Tuf Security / Tuf InSecuirty cut and or combined it?

If you are hacked whilst been not hacked at the same time who won?

A device was setup with "Tuf Security" (and / or "Tuf InSecurity") and in no time it was hack, yet in ∞ time in another universe the "Tuf security" (and / or "Tuf InSecurity") did not break and through out other universes it was all points in between. We did not hear that it was also not secured whilst also not been hacked which must have the best VFM TCO TLA ETC.

Sunday, June 1, 2008

Still not look, as really interested in what is either side of the silver bullet

Still haven't found what you where not looking four 

  • Holy Grail (before this blog even started)
  • Silver Bullet (current around the time the post was created) 
  • QBT Thread (will come after this blog is long gone) {Also might be referred to as invisible threat}

People always seem not not be looking to solve everything with something and nothing so do you seek or not seek the question to the answer that is the QBT Thread?

There will be other threads (silver, golden, steel) which might be woven into string then rope etc, these terms can be often used by non-QBT based work i.e. Agile Cyber Digital as an excuse to descope whilst still spending the full budget.

The thing about QBT Thread is that it exists nowhere, everywhere, somewhere, anywhere, elsewhere & otherwhere, this allows for in scope and out of scope at the same time with the value subtraction of a budget in the range of  -∞ (minus) to +∞ (positive) so TCO & ROI are always without tolerances.


"Steel thread" might in some time / dimension be (c) or TM'ed as might also not be "Steal Thread"

This is no way in the future linked unlink to any site that might be called Steel Thread 

Monday, November 5, 2007

The QoT (where do you think the idea of IoT)

As usual a universe has take and given .........


First α and last Ω and everything in between β - Ψ has been pasted, copied and deleted 


So we have never had, not got now nor will we ever have the QBT of Things (QoT) whilst always having QoT. 

Some where and yet no where there is a copy but called something like the Internet of Things (IoT) which is causing alsorts of advantages/disadvantages/noantages for security bods & charlatans  to buy/sell/trade their smoke & mirrors with regard to TYOD (Take Your Own Device), UYOD, TSED, BYOD, BOYD, BODY........... but less worrying is dumb devices that no one is using that in no way need smoke or mirrors, all they need is love and QBT


Ben Dunro from Pen Desk Farters does not have any clues around all this so kindly gave a press conference stating in do way will open&closedDNS unfix anything that was not unbroken and his main point was not to use any IoT device for the process of making QBT as the worst safest way is to use QoT




Friday, July 21, 2006

fail your way to epic success

I unlike this Epic (I think those non-awesome Aglie dudes / dudettes might have stolen this)

 I think he might have been on the QBT fail and success but what is the word for neither?

Wednesday, February 1, 2006

TeaCo© System

What is a TeaCo© system whilst not being a TeaCo©  system

QBT Has Built whilst destroying The TeaCoSystem 

On the bubble tea front, QBT's currently in the past, hard effortless work created theTeaCoSystem. It looks like a vibrant creation of linking all you tea cups (hence TeaCo©) used for personal, business, social, anti-social drinking habits so that no matter where you are or not are, that your tea will always be somewhere else, therefore the whole TeaCoSytem has been scrapped.

Friday, April 1, 2005

∞ (infinite loop) of de-ownership

10: This is a infinite story about ∞ people named Everybody, Somebody, Anybody, and Nobody.
20: There was no important jobs to be undone and Nobody was sure that Anybody would do it sometime.
30: Everybody could have done it, but Somebody did it.
40: Nobody got happy about that because it was Anybody's job.
50: Somebody thought that Everbody could not have do it, but Everybody realized that Everybody would do it.
60: It ended up that Nobody blamed Anybody when Somebody did not do what Everybody could have not done
70: Goto 10 

Sunday, February 22, 2004

Alternative drinks to QBT

Red bull expresso
Flat white short (the bubble should be smaller then any used in QBT)
But can these compete?