1996-02-24 - Re: REM_ote

Header Data

From: Alex Strasheim <cp@proust.suba.com>
To: cypherpunks@toad.com
Message Hash: c4024bbe2bbcb8568ea11c451476b27a8c4a3ff7ff0945ae1b3ddddee5586c25
Message ID: <199602232332.RAA00171@proust.suba.com>
Reply To: <199602231751.MAA16891@pipe3.nyc.pipeline.com>
UTC Datetime: 1996-02-24 02:55:01 UTC
Raw Date: Sat, 24 Feb 1996 10:55:01 +0800

Raw message

From: Alex Strasheim <cp@proust.suba.com>
Date: Sat, 24 Feb 1996 10:55:01 +0800
To: cypherpunks@toad.com
Subject: Re: REM_ote
In-Reply-To: <199602231751.MAA16891@pipe3.nyc.pipeline.com>
Message-ID: <199602232332.RAA00171@proust.suba.com>
MIME-Version: 1.0
Content-Type: text


> Marianne Mueller, Java security engineer, also said the chances of such
> hacking occurring are "remote."

This is the sort of bullshit that gets companies in trouble.  Netscape has
a good record of responding to and fixing security problems.  Why should
they feel the need to do spin control?  This borders on lying.

If the hole is there, hackers will distribute toolkits that will let even
comparitively unskilled people exploit it.  Here in Chicago, there is a
group of hackers that teaches organized classes on how to break into
systems, and they give their students toolkits.

Anything you can do with a computer can be automated.  If there's a 
difficult way to hack into a machine, someone can put it in a box that 
makes it easy.





Thread