16 Sep
2015
16 Sep
'15
2:27 a.m.
On Tue, 15 Sep 2015 22:15:10 -0400 dan@geer.org wrote:
what's funny is this leads to security advantage through obscurity, where the bespoke solutions break off-the-shelf exploitation techniques.
[I'm behind; this may be a duplicate]
DARPA is actively looking at obfuscation https://www.fbo.gov/index?s=opportunity&mode=form&id=a303af332a90b1e84fdb91d7dd382396&tab=core&_cview=0
Dr. Michael Hsieh, SafeWare@darpa.mil that's a good address to send so called child porn
Which leads me to ask the general question, what does one do when something you might soon depend upon can simply never be analyzed?
We can oh so easily return to a world of sorcerers, alchemy, and faith in powers in proportion to their mystery.
--dan