On 9 Oct 2018, at 9:49pm, Warren Young <war...@etr-usa.com> wrote: > Also: This list may be an unusually juicy target, given the number of places > SQLite is deployed.
The minute SQLite gains any sort of internet connectivity, a hundred thousand man-hours of cracking attempts will be launched. Which is why it's great the way it is. Back door access to every mobile phone's contact list ? That's monetised-hacker heaven. As Fossil gains TCP, sockets, streams, or anything else, it becomes a more tempting target. But the biggest dangers are more difficult, and take longer, to exploit. And I'm not going to discuss them publicly. Nevertheless, it's a less tempting target than SQLite. The best protection is that all source code is public. Anyone who thinks there's vuln can raise it, and ten people will evaluate it while the USA is still asleep. Simon. _______________________________________________ sqlite-users mailing list sqlite-users@mailinglists.sqlite.org http://mailinglists.sqlite.org/cgi-bin/mailman/listinfo/sqlite-users