On Thu, Jan 5, 2012 at 12:45 PM, William A. Rowe Jr. <wr...@rowe-clan.net> wrote: > http://www.nruns.com/_downloads/advisory28122011.pdf > > Should we add some randomization to prevent abuse? > > It's hard to anticipate how folks might leverage apr, and how malicious > folks might then seek to exploit computational workload vectors. > > Thoughts?
We don't want to say "go fish" to APR applications if our hash plus their vector results in an exploit.