home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!pipex!warwick!uknet!mcsun!sun4nl!tuegate.tue.nl!blade.stack.urc.tue.nl!johan
- From: johan@blade.stack.urc.tue.nl (Johan Wevers)
- Newsgroups: alt.security
- Subject: Re: A Solicitation for Opinions
- Message-ID: <6183@tuegate.tue.nl>
- Date: 5 Nov 92 15:53:59 GMT
- References: <6035@tuegate.tue.nl> <Bx6oLy.L7z@minerva1.bull.it> <1992Nov4.153248.12490@ulysses.att.com>
- Sender: root@tuegate.tue.nl
- Lines: 20
-
- smb@ulysses.att.com (Steven Bellovin) writes:
-
- >> Agree, and I would go beyond that. Computer 'underground' representatives
- >> should actively give their input to security plans and activities and they
- >> should be listened to.
-
- >Assuming, of course, that you can trust their answers... That's the
- >thing -- I regard computer break-ins, especially those that are done
- >for ``fun'' or ``knowledge'' as a manifestation of ethical issues. Given
- >that, by default I do not trust the offenders. I'm willing to be
- >persuaded otherwise, but the burden of proof is on them, not me.
-
- This is bullshit: you can check the answers by an expert. Most security
- holes are just overlooked by experts, but they're certainly capable to
- see wether something is a hole or not when they're pointed at.
- --
- **********************************************************
- * J.C.A. Wevers * The only nature of *
- * johan@blade.stack.urc.tue.nl * reality is physics. *
- **********************************************************
-