It reflects a prevailing myth that production technology is no more amenable to human judgment or social interests than the laws of thermodynamics atomic structure or biological inheritance.
A company can spend hundreds of thousands of dollars on firewalls intrusion detection systems and encryption and other security technologies but if an attacker can call one trusted person within the company and that person complies and if the attacker gets in then all that money spent on technology is essentially wasted.
Next Article
I'd like people to be educated on the voting machines making sure that our democracy isn't being hijacked by computer technology. There's no reason there can't be a paper trail on those machines.