lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5.0.0.25.2.20030926171050.04e27580@pop3.direcway.com>
From: madsaxon at direcway.com (madsaxon)
Subject: Daniel Geer, author of cybersecurity  screwed

At 05:35 PM 9/26/03 -0400, Stormwalker wrote:
>If this is all true, this event is way
>  past a bad precedent. @Stake has crossed an important line and can no
>  longer be trusted at all, no matter  what their roots are. If the rest 
> of   the employees at @Stake tolerate this, then they are not to be 
> tusted either.

While I agree with your basic sentiment here, it's premature to
condemn @Stake categorically.  The facts are undoubtedly a great
deal more complex than the media portrayals to date have revealed.
Let's wait until we know the whole story before we lower the boom.

m5x


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ