lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri Jan 13 20:26:20 2006
From: jasonc at science.org (Jason Coombs)
Subject: Steve Gibson smokes crack?

Stan Bubrouski wrote:
> Ordinarily I'd argue, but its hard to when we find out Microsoft knew
> about the bug for a long time and made a concious decision not to
> patch it even though they knew it could lead to a system compromise.

It's hard to imagine anything other than conscious and willful 
preservation of known backdoors in Windows as an explanation for 
Microsoft's refusal to enable Windows Firewall by default until XP SP2.

Microsoft knew for years, if not from the very start, that all Windows 
boxes were by design exposing backdoors on the network, yet they did 
nothing to remedy the situation nor alert any customer to the risk.

This smells to me like a whole slew of intentional backdoors, and I 
don't smoke anything.

Regards,

Jason Coombs
jasonc@...ence.org

Powered by blists - more mailing lists