[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <128890.1332767133@turing-police.cc.vt.edu>
Date: Mon, 26 Mar 2012 09:05:33 -0400
From: Valdis.Kletnieks@...edu
To: IA64 LOL <ia64lol@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Apple IOS security issue pre-advisory record
On Sat, 24 Mar 2012 13:21:12 -0700, IA64 LOL said:
> everything is obvious after its pointed out.
Not everything.
Consider Diffie-Hellman key exchange. There are very few people with enough
number theory clue that it's "obvious" as to *why* DH works on a first
explanation . Most people can eventually convince themselves that it can be
used to exchange numbers. Convincing yourself that it's done in a
non-interceptible manner is a lot harder..
Or consider BPG wedgies - if it's obvious to you why they're peristent,
you should be applying for a job as a senior BGP engineer at a major
network. ;)
Content of type "application/pgp-signature" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists