X-Recipient: archive-cygwin AT delorie DOT com DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:message-id:date:from:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; q=dns; s=default; b=burwQTeP7VK0PgiUlCnsOxoJIo8pjhbB9s1Vm7OvkYo ex4J1mLlzYXvvqGn1+Nj7gcwAfUjD6McrkGeEtPwpgBi2Rks9MZebu2rcNinTYYF 2W8FWN9+wnHrGdTDt1/+2bhCgJ5RCKWJI9WD2MPUbW+Q5lNcjL1PZAx8D3lybBzc = DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:message-id:date:from:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; s=default; bh=00e4jXpBnNSWJb7hnemIY7HBeL4=; b=aYGcqbFbhBXiBFWb5 6ebYsPbHroVqQzCyLRfP4p5tmsL3wlrEV48zcDGBEgvhUMazY1lmVS4fUB7VTETE j6VOw2pQU/p5gNvqOEQNLBBck3fROLgS/onyn1wF88DwBmE2knJ27S/PYRCdWSmt 8VYC2zzev6hszacFaTNBAzJMeM= Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-owner AT cygwin DOT com Mail-Followup-To: cygwin AT cygwin DOT com Delivered-To: mailing list cygwin AT cygwin DOT com Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-0.0 required=5.0 tests=AWL,BAYES_50,RP_MATCHES_RCVD autolearn=ham version=3.3.2 X-HELO: Ishtar.hs.tlinx.org Message-ID: <56050A3D.6020500@tlinx.org> Date: Fri, 25 Sep 2015 01:47:57 -0700 From: Linda Walsh User-Agent: Thunderbird MIME-Version: 1.0 To: cygwin AT cygwin DOT com Subject: Re: cygwin potentially corrupting permissions? References: <560366EE DOT 5020207 AT tlinx DOT org> <466149660 DOT 20150924213756 AT yandex DOT ru> <56044E61 DOT 6060202 AT tlinx DOT org> <1228432255 DOT 20150925044648 AT yandex DOT ru> <5604B7D7 DOT 9080704 AT tlinx DOT org> <772221980 DOT 20150925112219 AT yandex DOT ru> In-Reply-To: <772221980.20150925112219@yandex.ru> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-IsSubscribed: yes Andrey Repin wrote: > @Greg Freemyer: An "army in the world" does not have passwords and firewalls. > That's the only reason they are trying to rely on obscurity. Doesn't quite > work, as attacker could just carpet bomb the target positions. --- password = obscure secret; crypto = hidden secrets that take time to find. Both are a form of obscurity. -- Problem reports: http://cygwin.com/problems.html FAQ: http://cygwin.com/faq/ Documentation: http://cygwin.com/docs.html Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple