Hello Marck,

On Mon, 12 Jul 2004 09:55:41 +0100 GMT (12/07/2004, 15:55 +0700 GMT),
Marck D Pearlstone wrote:

MDP> Lesse ... setting aside the issue of mail server access, TB connects
MDP> to a fixed, named server under your control to fetch smileys, rogues
MDP> and PGP keys administrated by a responsible administrator. The name
MDP> of the rogue may be specifiable by the sender, but the source is
MDP> not. Exploitable? Not from where I'm looking at it.

A spammer sends a mail that triggers the download to millions of TB
users. They all connect to the same site, a DDoS attack.

Maybe not, because they won't connect all at the same time. But the
millions of TB users may not be so unrealistic in the future.

Or how about this: A spammer uploads a pic that has code it in. When
it is downloaded, an automatic message with the email address,
rogue-code, and show size will be sent to the spammer. The one who
downloaded it will be flooded with ads for shoes.

Or, the domain is redirected by a hacker. Instead of downloading a
roguemoticon, the user downloads malware. Every time he looks at any
picture, his credit card details are sent to the malware author and
the fridge stops working.

MDP> It's seems pretty clear to me. OE = full sender control. TB = full
MDP> user control. TB wins! (as usual).

A bit simple (highly unusual for you).

(don't hit me)

-- 

Cheers,
Thomas.

Moderator der deutschen The Bat! Beginner Liste.

Baseball is 90% mental; the other half is physical. (Yogi Berra)

Message reply created with The Bat! 2.12 RC/3
under Chinese Windows 98 4.10 Build 2222 A 
using a Pentium P4 1.7 GHz, 256MB RAM



________________________________________________________
 Current beta is v2.12 RC/1 | 'Using TBBETA' information:
http://www.silverstones.com/thebat/TBUDLInfo.html
IMPORTANT: To register as a Beta tester, use this link first -
http://www.ritlabs.com/en/partners/testers/

Reply via email to