delorie.com/archives/browse.cgi   search  
Mail Archives: cygwin/2015/09/25/04:48:30

X-Recipient: archive-cygwin AT delorie DOT com
DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id
:list-unsubscribe:list-subscribe:list-archive:list-post
:list-help:sender:message-id:date:from:mime-version:to:subject
:references:in-reply-to:content-type:content-transfer-encoding;
q=dns; s=default; b=burwQTeP7VK0PgiUlCnsOxoJIo8pjhbB9s1Vm7OvkYo
ex4J1mLlzYXvvqGn1+Nj7gcwAfUjD6McrkGeEtPwpgBi2Rks9MZebu2rcNinTYYF
2W8FWN9+wnHrGdTDt1/+2bhCgJ5RCKWJI9WD2MPUbW+Q5lNcjL1PZAx8D3lybBzc
=
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id
:list-unsubscribe:list-subscribe:list-archive:list-post
:list-help:sender:message-id:date:from:mime-version:to:subject
:references:in-reply-to:content-type:content-transfer-encoding;
s=default; bh=00e4jXpBnNSWJb7hnemIY7HBeL4=; b=aYGcqbFbhBXiBFWb5
6ebYsPbHroVqQzCyLRfP4p5tmsL3wlrEV48zcDGBEgvhUMazY1lmVS4fUB7VTETE
j6VOw2pQU/p5gNvqOEQNLBBck3fROLgS/onyn1wF88DwBmE2knJ27S/PYRCdWSmt
8VYC2zzev6hszacFaTNBAzJMeM=
Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm
List-Id: <cygwin.cygwin.com>
List-Subscribe: <mailto:cygwin-subscribe AT cygwin DOT com>
List-Archive: <http://sourceware.org/ml/cygwin/>
List-Post: <mailto:cygwin AT cygwin DOT com>
List-Help: <mailto:cygwin-help AT cygwin DOT com>, <http://sourceware.org/ml/#faqs>
Sender: cygwin-owner AT cygwin DOT com
Mail-Followup-To: cygwin AT cygwin DOT com
Delivered-To: mailing list cygwin AT cygwin DOT com
Authentication-Results: sourceware.org; auth=none
X-Virus-Found: No
X-Spam-SWARE-Status: No, score=-0.0 required=5.0 tests=AWL,BAYES_50,RP_MATCHES_RCVD autolearn=ham version=3.3.2
X-HELO: Ishtar.hs.tlinx.org
Message-ID: <56050A3D.6020500@tlinx.org>
Date: Fri, 25 Sep 2015 01:47:57 -0700
From: Linda Walsh <cygwin AT tlinx DOT org>
User-Agent: Thunderbird
MIME-Version: 1.0
To: cygwin AT cygwin DOT com
Subject: Re: cygwin potentially corrupting permissions?
References: <CAGpXXZKUQtAbrQ80VDHZhy0aZtzG+5fDB7bcYz-kwQ3Kgx6ueQ AT mail DOT gmail DOT com> <560366EE DOT 5020207 AT tlinx DOT org> <CAGpXXZJeWs33BJi7qROduZEhTx1pXXXseTbfXu+QP8+cf_r5hQ AT mail DOT gmail DOT com> <466149660 DOT 20150924213756 AT yandex DOT ru> <56044E61 DOT 6060202 AT tlinx DOT org> <1228432255 DOT 20150925044648 AT yandex DOT ru> <5604B7D7 DOT 9080704 AT tlinx DOT org> <772221980 DOT 20150925112219 AT yandex DOT ru>
In-Reply-To: <772221980.20150925112219@yandex.ru>
X-IsSubscribed: yes

Andrey Repin wrote:
 
> @Greg Freemyer: An "army in the world" does not have passwords and firewalls.
> That's the only reason they are trying to rely on obscurity. Doesn't quite
> work, as attacker could just carpet bomb the target positions.
---
password = obscure secret; crypto = hidden secrets that take time to find.

Both are a form of obscurity.

 

--
Problem reports:       http://cygwin.com/problems.html
FAQ:                   http://cygwin.com/faq/
Documentation:         http://cygwin.com/docs.html
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple

- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019