[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Linux Foundation' Linux workstation security checklist



On Tue, 15 Sep 2015 22:15:10 -0400
[email protected] wrote:

>  > what's funny is this leads to security advantage through obscurity,
>  > where the bespoke solutions break off-the-shelf exploitation
>  > techniques.
> 
> [I'm behind; this may be a duplicate]
> 
> DARPA is actively looking at obfuscation
> https://www.fbo.gov/index?s=opportunity&mode=form&id=a303af332a90b1e84fdb91d7dd382396&tab=core&_cview=0



	Dr. Michael Hsieh, [email protected]

	that's a good address to send so called child porn 






> 
> Which leads me to ask the general question, what does one do when
> something you might soon depend upon can simply never be analyzed?
> 
> We can oh so easily return to a world of sorcerers, alchemy, and
> faith in powers in proportion to their mystery.
> 
> 
> --dan
> 
>