lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <LIEJLNPGKKKJOIKCMPJEGEOFCIAA.sean01@accnet.com.au>
From: sean01 at accnet.com.au (Sean Crawford)
Subject: The ultimate solution to phising

--------->Stian Ovrevage [sovrevage@...il.com] wrote..

---> 1. The solution to phising?
--->
---> With  firm believe  of a  world of  forgiveness,
---> and  awareness of  the risk  of total  ridicule,
---> I propose my solution to phising:
--->
---> Stop clicking _any_ hyperlinks, going somewhere?
---> _Type_  the  address  into   the  addressbar  of
---> your   browser.   Don't  use   your   favorites.
---> And never ever click on  hyperlinks recieved in
---> e-mails!
--->
---> /*  No-click actually only  applies  to external
---> sources, but  the whole problem  with phising
---> is that  the average user cannot  decide whether
---> XYZ is an trusted or untrusted source, no matter
---> how legitimate it might look. So allowing for a
---> mental loophole of this rule will prove fatal */

Great solution mate but what would you do in the real world of home users
and clueless workstation operators?..
Try and tell Mr. Hunt n Peck not to click a hyperlink...end users are a
loophole.
Sean.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ