lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040212205451.GD52968@netpublishing.com>
From: ggilliss at netpublishing.com (Gregory A. Gilliss)
Subject: How much longer?

I flamed Mr. rude off list, but there is one point that I would like to
respond to on list...

The original poster asked whether a development was due to an unofficial
government policy.

Aside from all the nastier parts of the PATRIOT act (and Magic Lantern and
the other stuff that's already been mentioned), and given the complexity of
modern software, backdoors from vendors and strategic agreements between
government and private industry, whether for their own use or as part of 
a 'comic-book neo-con conspiracy', are real. 'nuf said.

G

On or about 2004.02.12 12:18:36 +0000, cptnug (cptnug-fulldisclosure@...ray.net) said:

> My own opinion is that most software is so bad security-wise there's just
> no need for explicit backdoors. The US government TLAs can trust software
> developers (and if not them, the users) to make enough mistakes that they
> don't need to force or ask them to put in backdoors on purpose.

-- 
Gregory A. Gilliss, CISSP                              E-mail: greg@...liss.com
Computer Security                             WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ