lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1042214442.4226.141.camel@FatBoy>
From: ken_i_m at elegantinnovations.net (Ken Dyke)
Subject: Fwd: fuck symantec & boycott bugtraq

On Fri, 2003-01-10 at 06:21, Brian McWilliams wrote:
> Like folks said earlier, the "Exploit" tab is missing, but that doesn't 
> mean the exploit is gone. You just have to dig, starting with the stuff in 
> the "Credit" tab, to find the SF mailing list message that spawned the BID 
> in the first place.

It could also be argued that this is the first step in making that
information disappear.  Keep moving it to raise the doubt that it has
not disappeared but one is simply not "digging" deep enough to find it.

It also raises the level of friction for workers who have relied on that
info being there.  Greatly increasing the time required for a task that
involves referencing that info in some way.

Of course, if this info is core to what someone does they are an idiot
for not mirroring the data in some fashion.  Never rely on another party
for a core dependency.  To me, this is the number one reason against
proprietary operating systems and applications.

-- 
I think, therefore, ken_i_m
Chief Gadgeteer,
Elegant Innovations


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ