lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: New Hacking Zine: p62 (formatting corrected) 

On Tue, 23 Sep 2003 07:46:20 +0545, npguy <npguy@...net.com>  said:
> trust http://www.phrack.org! 

How do we know it hasn't been hacked and a bogus issue put up, or a real issue
suppressed?

(this is where everybody who's not familiar with it should go re-read Ken Thompson's
"Reflections on Trusting Trust" (http://www.acm.org/classics/sep95/)

The "unknown Air Force document" is this:

"Multics Security Evaluation: Vulnerability Analysis* by Karger and Schell
http://www.acsac.org/2002/papers/classic-multics-orig.pdf

Those who think a 30-year-old paper is irrelevant and crufty should read the
same author's retrospective: "Thirty Years Later: Lessons from the Multics
Security Evaluation" http://www.acsac.org/2002/papers/classic-multics.pdf

Trust? What's that?  Pass me the tinfoil, I need to make a helmet. ;)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030922/5035746a/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ