lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <49ED9B32.8070306@conus.info> Date: Tue, 21 Apr 2009 13:08:50 +0300 From: Dennis Yurichev <dennis@...us.info> To: full-disclosure@...ts.grok.org.uk Subject: Obfuscated patches -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi. Just curious: will we see one day obfuscated patches (in a manner of obfuscated code) to make reverse engineer's (who would like to create exploits after security patches out) work harder? - -- My PGP public key: http://yurichev.com/dennis.yurichev.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.8 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkntmzEACgkQ1YPmFmJG++Mf6gCgsROYYPPbm1WAb0G1bvoY31xx SmkAoKchR/T02hz8CBpztc4J6Uc+m6OZ =9mmf -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/