[ale] The FUD Never Stops
Greg
runman at speedfactory.net
Mon Apr 12 14:35:01 EDT 2004
... and let's not forget writing your own compilers - as someone (Ken
Thompson ?) put his exploits in their compiler in a bet with the US Navy
(??) so regardless of what exploit code the Knavey found, the exploits "kept
showing up". I think this example is in Bob Toxen's book, but I am not
sure. It just comes to mind on how complete you have to be for total
security. I guess the most secure box is the one that is not turned on.
What crud - like I am currently able to re-invent every wheel (s/w) and
cog(h/w) in a computer.
Greg
> -----Original Message-----
> From: ale-bounces at ale.org [mailto:ale-bounces at ale.org]On Behalf Of Jason
> Etheridge
> Sent: Monday, April 12, 2004 1:03 PM
> To: Atlanta Linux Enthusiasts
> Subject: Re: [ale] The FUD Never Stops
>
>
> On Apr 12, 2004, at 12:18 PM, Michael D. Hirsch wrote:
> > Y'all excuse me while I go and spend the rest of my life writing my own
> > software.
>
> You have to build your own hardware from the ground up, too, for true
> security.
>
> -- Jason
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://www.ale.org/mailman/listinfo/ale
>
More information about the Ale
mailing list