lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAH8yC8mh+UMRViLGBS0R8NQWpwpT1cEz01X-9ZnMcLLUZweAFw@mail.gmail.com>
Date: Tue, 13 Nov 2012 17:47:28 -0500
From: Jeffrey Walton <noloader@...il.com>
To: Thierry Zoller <Thierry@...ler.lu>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>,
	"bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>
Subject: Re: GOOD for Enterprise (GMA) below 2.0.2
 vulnerable to MITM

On Tue, Nov 13, 2012 at 4:56 PM, Thierry Zoller <Thierry@...ler.lu> wrote:
>
> RANT
> ----
> The  world  of  mobile  applications  appear to have become one where vulnerability
> disclosure    and   awareness  are  not  necessary.  Until  there  are fully automated
> updates  and  refusal  of  service for outdated applications I see the
> need for disclosure.
Mobile is a step backwards in software security (back to about the
mid-1990s) due to patching. Or more correctly, lack thereof. I've been
bitching about it for years.

I'm convinced the only way to fix it is through legislation and
software liability laws. Waiting for companies to "do the right thing"
means will be waiting a very long time (given their track record)
because "do nothing" is cost effective and maximizes profits,

> GMA failed to validate server authenticity when connecting through HTTPS
The Security Architect for Good should be fired if that sort of thing
is acceptable.

Jeff

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ