BSD tty security, part 4: What You Can Look Forward To

Dave Hayes dave at jato.jpl.nasa.gov
Wed May 1 08:31:29 AEST 1991


erc at Apple.COM (Ed Carp) writes:

>In article <3600:Apr2614:04:4391 at kramden.acf.nyu.edu> brnstnd at kramden.acf.nyu.edu (Dan Bernstein) writes:
>>6. I will give further details on the security holes to anyone who
>>convinces me that he has a legitimate interest. That means I want a
>>verifiable chain of people and phone numbers from the contact for a
>>major network down to whoever wants the information, plus a better
>Um, what IS this bullshit? 

What indeed? Methinks it IS just that.

> Who the hell are you to set yourself up as some sort
>of net.god and tell us that you will "bless" us with all your neat little hacks
>and info only if we satisfy your little set of rules?  Your pathetic excuses
>about protecting the information from "black hats" is unmitigated bullshit.

THANK YOU for saying this! I'm glad someone out there has sense.

>The only thing you are doing is concealing any valuable information that you
>may have from the people who have a genuine need for your information.  The
>folks who already care about cracking into systems already know about this
>stuff anyway.  Get real.

Hear, hear!

-- 
Dave Hayes - Network & Communications Engineering - JPL / NASA - Pasadena CA
dave at elxr.jpl.nasa.gov       dave at jato.jpl.nasa.gov           ames!elroy!dxh

        There is a saying: "I believe it because it is impossible"
If you make any study of people in a state of what they are pleased to call 
belief, you will find that you can usually best describe them by the saying:
                  "My belief has made me impossible."



More information about the Comp.unix.wizards mailing list