On 2015-11-28 2:40 PM, Eric Rescorla wrote:
How odd that your e-mail was in response to mine, then.

Thanks, super helpful, really moved the discussion forward, high five.

To Ehsan's point that "malicious code here might look like this: console.log("success"); [and] It's impossible to tell by looking at the code whether that line prints a success message on the console, or something entirely different, such as running calc.exe." - that's true, but it also looks a lot like the sort of problem antivirus vendors have been dealing with for a long time now. Turing completeness is a thing, the halting problem exists and monsters are real, sure, but that doesn't mean having antivirus software is a waste of time that solves no problems and protects nobody.

One key claim Stillman made, that " A system that takes five minutes to circumvent does not “raise the bar” in any real way", is perhaps true in an academic sense, but not in a practical one. We know a lot more than we did a decade ago about the nature of malicious online actors, and one of the things we know for a fact is the great majority of malicious actors on the 'net are - precisely as Jorge asserts - lazy, and that minor speedbumps - sometimes as little as a couple of extra clicks - are an effective barrier to people who are doing whatever it is they're about to do because they're bored and it's easy. And that's most of them.

Any semicompetent locksmith can walk through your locked front door without breaking stride, but you lock it anyway because keeping out badly-raised teenagers is not "security theater", it's sensible, cost-effective risk management.

- mhoye

_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to