On 4/23/09 7:10 PM, Zachary Voase wrote:
> An application such as iTunes (which keeps DRM
> decryption keys in memory) is also subject to similar issues, but I
> don't think anyone's yet made a viable attack against that.

In my mind, there's a significant difference between breaking DRM vs. 
gaining unauthorized control over a user's account.

And, again, merely not having an implemented exploit doesn't make the 
threat any less trivial to implement or dangerous once it is.

-- 
Dossy Shiobara              | do...@panoptic.com | http://dossy.org/
Panoptic Computer Network   | http://panoptic.com/
   "He realized the fastest way to change is to laugh at your own
     folly -- then you can let go and quickly move on." (p. 70)

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to