Paul Gilmartin wrote:
>I believe otherwise. I know of a case where a vendor allowed a product
>to escape to the field containing a tester's back door, and another
>related to II14489. Either could be exploited with no brute force,
>merely knowledge of the existence and nature of the defect. In the
>case of the latter, the vendor chose to obscure the details very long
>term to protect customers who might not have installed the fix.
>"That's security by obscurity."

But that's still the same thing, just smaller: IF they knew about it, then they 
could exploit it. It's just a matter of degree. Similarly, OCO makes it harder 
to find the way around, say, a CPUID or license key. 

>But protecting passwords is a valid use of "That's security by
>obscurity." A password is not a pervasive defect as those other cases
>are.

"protecting passwords" in what context? I'm sure your point is valid but it's 
escaping me!


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to