Ghost (
hacktivist) wrote in
capeandcowl2012-05-08 03:32 pm
![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
![[community profile]](https://www.dreamwidth.org/img/silk/identity/community.png)
Entry tags:
◘ 16 ◘ voice;
It's telling to examine the similarities in emotional and computing vulnerabilities.
Many of the same security problems that existed in IPv4's implementation were not corrected in IPv6 (buffer overflows). One careless programmer can make a hundred thousand problems down the line with a brief lapse of attention (bounds checking). Constant vigilance and repeated testing of personal defenses are the only sure methods of safety.
And safety is a target in motion.
Generally speaking: how many times do you have to make the same mistake before you learn? Only once? Twice?
A hundred times?
Many of the same security problems that existed in IPv4's implementation were not corrected in IPv6 (buffer overflows). One careless programmer can make a hundred thousand problems down the line with a brief lapse of attention (bounds checking). Constant vigilance and repeated testing of personal defenses are the only sure methods of safety.
And safety is a target in motion.
Generally speaking: how many times do you have to make the same mistake before you learn? Only once? Twice?
A hundred times?
[voice]
[voice]
[voice]
[voice]
How have you been, Doctor?
[voice]
[voice; encrypted]
[voice; encrypted]
[voice; encrypted]
[voice; encrypted]
[voice; encrypted]
If you have targets, I can attempt to suggest them to him.