Re: [Full-disclosure] Gödel and kernel backdoors

2010-10-14 Thread Pavel Kankovsky
On Sun, 19 Sep 2010, Georgi Guninski wrote: > On Sun, Sep 19, 2010 at 06:21:35PM +0200, Pavel Kankovsky wrote: > > On the other hand, It is possible to "detect all bad programs" if it is > > allowed to err on the safe side and mistake some good programs for bad > > programs. An extreme example is

Re: [Full-disclosure] Gödel and kernel backdoors

2010-09-20 Thread dave b
News flash: Computers are just not secure enough for us to use. But, I don't use computers ... only non-deterministic Turing machines ;) -- But, for my own part, it was Greek to me.               -- William Shakespeare, "Julius Caesar ___ Full-Disclosu

Re: [Full-disclosure] Gödel and kernel backdoors

2010-09-20 Thread wmsecurity
Nowadays most vendors interferes and alters *a lot* in your operating system, from hooking Win32 API functions to modification of the IAT. It's only a question of who came first, the malware or the protection program. On Sun, Sep 19, 2010 at 00:30, Giuseppe Fuggiano wrote: > On Sat, 2010-09-18 a

Re: [Full-disclosure] Gödel and kernel backdoors

2010-09-20 Thread Valdis . Kletnieks
On Mon, 20 Sep 2010 01:03:21 PDT, Hurgel Bumpf said: > The solution could be a virtualized operating system, which has a control > layer between the operating system and the hardware abstraction layer. Changes > to data could be non-persistent in the first step, and only written to > the hdd after

Re: [Full-disclosure] Gödel and kernel backdoors

2010-09-20 Thread Georgi Guninski
On Mon, Sep 20, 2010 at 01:03:21AM -0700, Hurgel Bumpf wrote: > The solution could be a virtualized operating system, which has a control > layer between the operating system and the hardware abstraction layer. > Changes to data could be non-persistent in the first step, and only written > to th

Re: [Full-disclosure] Gödel and kernel backdoors

2010-09-20 Thread Hurgel Bumpf
Von: Georgi Guninski > Betreff: [Full-disclosure] Gödel and kernel backdoors > An: full-disclosure@lists.grok.org.uk > Datum: Samstag, 18. September, 2010 15:51 Uhr > http://plus.maths.org/content/goumldel-and-limits-logic > Gödel and the limits of logic > > Quote: > > An

Re: [Full-disclosure] Gödel and kernel backdoors

2010-09-19 Thread Christian Sciberras
"i doubt this can be remotely implemented in practice because of dynamic code like |eval| and mobile code." Because we all shout at and blacklist browsers when a website gets hacked and starts monitoring users' actions. On a more serious note, try a program, like Comodo's Firewall. You can ch

Re: [Full-disclosure] Gödel and kernel backdoors

2010-09-19 Thread Berend-Jan Wever
nevermind the fact that a "good" program in your list may contain as yet unknown vulnerabilities which mean it's actually bad. On Sep 19, 2010 7:08 PM, "Georgi Guninski" wrote: > On Sun, Sep 19, 2010 at 06:21:35PM +0200, Pavel Kankovsky wrote: >> On the other hand, It is possible to "detect all ba

Re: [Full-disclosure] Gödel and kernel backdoors

2010-09-19 Thread Georgi Guninski
On Sun, Sep 19, 2010 at 06:21:35PM +0200, Pavel Kankovsky wrote: > On the other hand, It is possible to "detect all bad programs" if it is > allowed to err on the safe side and mistake some good programs for bad > programs. An extreme example is to call all programs bad unless their > exact code ap

Re: [Full-disclosure] Gödel and kernel backdoors

2010-09-19 Thread Pavel Kankovsky
On Sat, 18 Sep 2010, Georgi Guninski wrote: > Another result that derives from Gödel's ideas is the demonstration that > no program that does not alter a computer's operating system can detect > all programs that do. What is impossible is reliable and perfect discrimination between "good" and "ba

Re: [Full-disclosure] Gödel and kernel backdoors

2010-09-18 Thread BMF
On Sat, Sep 18, 2010 at 3:30 PM, Giuseppe Fuggiano wrote: > On Sat, 2010-09-18 at 22:51 +0300, Georgi Guninski wrote: >> all programs that do. In other words, no program can find all the >> viruses on your computer, unless it interferes with *and alters* the >> operating system. > > Interesting,

Re: [Full-disclosure] Gödel and kernel backdoors

2010-09-18 Thread Giuseppe Fuggiano
On Sat, 2010-09-18 at 22:51 +0300, Georgi Guninski wrote: > http://plus.maths.org/content/goumldel-and-limits-logic > Gödel and the limits of logic > > Quote: > > Another result that derives from Gödel's ideas is the demonstration that > no program that does not alter a computer's operating syst

Re: [Full-disclosure] Gödel and kernel backdoors

2010-09-18 Thread mrx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 18/09/2010 20:51, Georgi Guninski wrote: > http://plus.maths.org/content/goumldel-and-limits-logic > Gödel and the limits of logic > > Quote: > > Another result that derives from Gödel's ideas is the demonstration that > no program that does not

[Full-disclosure] Gödel and kernel backdoors

2010-09-18 Thread Georgi Guninski
http://plus.maths.org/content/goumldel-and-limits-logic Gödel and the limits of logic Quote: Another result that derives from Gödel's ideas is the demonstration that no program that does not alter a computer's operating system can detect all programs that do. In other words, no program can find