Linux Foundation' Linux workstation security checklist

Juan juan.g71 at gmail.com
Tue Sep 15 19:27:13 PDT 2015


On Tue, 15 Sep 2015 22:15:10 -0400
dan at geer.org wrote:

>  > what's funny is this leads to security advantage through obscurity,
>  > where the bespoke solutions break off-the-shelf exploitation
>  > techniques.
> 
> [I'm behind; this may be a duplicate]
> 
> DARPA is actively looking at obfuscation
> https://www.fbo.gov/index?s=opportunity&mode=form&id=a303af332a90b1e84fdb91d7dd382396&tab=core&_cview=0



	Dr. Michael Hsieh, SafeWare at darpa.mil

	that's a good address to send so called child porn 






> 
> Which leads me to ask the general question, what does one do when
> something you might soon depend upon can simply never be analyzed?
> 
> We can oh so easily return to a world of sorcerers, alchemy, and
> faith in powers in proportion to their mystery.
> 
> 
> --dan
> 
> 




More information about the cypherpunks mailing list