think about it
they’re everywhere
in every company
they manage the pipelines
design, maintain
the routes of the most sensitive data
now, of course, there’s cryptography
that’s great at keeping individual bits locked
but zoom out further
every IT professional
either work for a company with robust protocols to keep their data safe
or work for a company that works for another, with non-disclosure agreements up the wazoo
So that’s fine; all the data stays tucked away, high in the cloud
But what’s between the lines?
What can be inferred by what is not said?
Which companies have agreements with whom?
And the boots on the ground, they know where at least some of the bodies are buried
They know what they’re asked to do and not do
But they have an idea of what is what and what goes where
So, in the lines between what is not said, as much from what is
Could be pieced together the most valuable
Dangerous and incendiary secrets
Leave a Reply
You must be logged in to post a comment.