lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <096901c3df89$70d0edc0$c400a8c0@MLANDE>
From: mlande at bellsouth.net (Mary Landesman)
Subject: Anti-MS drivel

> not lose your keys on purpose

Does anyone lose their keys on purpose? :-)

As I stated originally, you can reduce the risk but you can never alleviate
it entirely. Windows can be broken, locks can be picked, heck, use a
chainsaw and you can slice right through pretty much any part of it. Of
course, it requires physical presence which raises the risk of being caught,
hence it's not very likely. Conversely, using the Internet to anonymously
launch exploits is pretty much risk-free - some might argue it's ideally
suited to the cowardly criminal. Sometimes smarts plays a part, but never
guts.

Now, MS has made bad decisions but they are not unique in this regard. They
certainly have more at stake, given the numbers of users, thus their bad
decisions tend to be very high profile. I suspect that when and if they
achieve their Trusted Computing goals, many of the same anti-MS folks will
shift their focus to complaining about the privacy and censorship issues it
brings to the table. Ironically, the very people who seek to publicly decry
and exploit every MS flaw are the ones who are helping to force TC into
reality. For more on the implications, see
http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html

-- Mary


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ