[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200311181950.hAIJoDr5004472@turing-police.cc.vt.edu>
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: Sidewinder G2
On Tue, 18 Nov 2003 12:26:36 EST, David Maynor said:
> I think that may be a bad example as that talks about crypto challenges
> as oppsoed to operational security products. There is a big diffrence in
> cryptanalysis and bug hunting in firewalls.
"Testing can prove the presence of flaws, but not their absence" -- Dijkstra.
The same exact logic of why a crypto challenge doesn't prove anything
applies to a firewall challenge as well.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031118/bb8001ac/attachment.bin
Powered by blists - more mailing lists