There is this general notion that any program can be cracked. This is
false. Check out this podcast on Formal Methods.
https://syslog.show/2020/08/10/episode7.html#d8d4afd2
Brian
On Fri, Apr 05, 2024 at 08:34:45AM -0700, Brian E. Lavender wrote:
On Fri, Apr 05, 2024 at 06:42:37AM -0700, bob r wrote:
In case you guys have not seen the recent
article on Andres Freund:
[
1]https://www.nytimes.com/2024/04/03/technology/prevent-cyberattack-li
nux.html?unlocked_article_code=1.iE0.ofz4.es1cqFob3-yk&smid=url-share
References
1.
https://www.nytimes.com/2024/04/03/technology/prevent-cyberattack-linux.htm…
Hey Bob, thank you for posting that! Here is some of the original
discussion.
https://www.openwall.com/lists/oss-security/2024/03/29/4
Good old autoconf. It's like dark magic. I tell you! I find it
interesting how the attacker squeezed that in there.
Brian
--
Brian Lavender
https://www.brie.com/brian/
"There are two ways of constructing a software design. One way is to
make it so simple that there are obviously no deficiencies. And the other
way is to make it so complicated that there are no obvious deficiencies."
Professor C. A. R. Hoare
The 1980 Turing award lecture
_______________________________________________
Lug-nuts mailing list -- lug-nuts(a)bigbrie.com
To unsubscribe send an email to lug-nuts-leave(a)bigbrie.com
--
Brian Lavender
https://www.brie.com/brian/
"There are two ways of constructing a software design. One way is to
make it so simple that there are obviously no deficiencies. And the other
way is to make it so complicated that there are no obvious deficiencies."
Professor C. A. R. Hoare
The 1980 Turing award lecture