[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: POSIX
From: |
Jonathan S. Shapiro |
Subject: |
Re: POSIX |
Date: |
Thu, 27 Oct 2005 10:37:27 -0400 |
On Thu, 2005-10-27 at 11:56 +0200, Alfred M. Szmidt wrote:
> I do not believe so. The difference is that with a kernel I know
> where the kernel came from and so do a lot of other users. If the
> kernel screws the users, they have a decent chance to figure this
> out and abandon the system. Also, kernels are well known to be
> sources of vulnerability and they get inspected.
>
> History shows that people are not interested in hacking kernels, they
> hack on programs.
Unfortunately, I have direct information that this statement is wrong.
It does appear to be true that the everyday hacker is not yet targeting
kernels, but the professionals definitely *are* doing so.
In any case, this is not relevant. Your original assertion was that
users cannot have any more confidence in their kernels then they can in
downloaded code. I was explaining why this was not correct.
shap
- Re: POSIX, (continued)
- Re: POSIX, Jonathan S. Shapiro, 2005/10/26
- Re: POSIX, Alfred M\. Szmidt, 2005/10/26
- Re: POSIX, Jonathan S. Shapiro, 2005/10/26
- Re: POSIX, Alfred M\. Szmidt, 2005/10/26
- Re: POSIX, Bas Wijnen, 2005/10/26
- Re: POSIX, Alfred M\. Szmidt, 2005/10/26
- Re: POSIX, Jonathan S. Shapiro, 2005/10/26
- Re: POSIX, Ronald Aigner, 2005/10/26
- Re: POSIX, Jonathan S. Shapiro, 2005/10/26
- Re: POSIX, Alfred M\. Szmidt, 2005/10/27
- Re: POSIX,
Jonathan S. Shapiro <=
- Re: POSIX, Alfred M\. Szmidt, 2005/10/27
- Re: POSIX, Jonathan S. Shapiro, 2005/10/27
- Re: POSIX, Jonathan S. Shapiro, 2005/10/26
- Re: POSIX, Bas Wijnen, 2005/10/26
- Re: POSIX, Jonathan S. Shapiro, 2005/10/26
- Re: POSIX, Leonardo Lopes Pereira, 2005/10/26
- Re: POSIX, Bas Wijnen, 2005/10/26
- Re: POSIX, Jonathan S. Shapiro, 2005/10/26
- Re: POSIX, Alfred M\. Szmidt, 2005/10/27
- Re: POSIX, Bas Wijnen, 2005/10/27