Ghost (
hacktivist) wrote in
capeandcowl2012-05-08 03:32 pm
![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
![[community profile]](https://www.dreamwidth.org/img/silk/identity/community.png)
Entry tags:
◘ 16 ◘ voice;
It's telling to examine the similarities in emotional and computing vulnerabilities.
Many of the same security problems that existed in IPv4's implementation were not corrected in IPv6 (buffer overflows). One careless programmer can make a hundred thousand problems down the line with a brief lapse of attention (bounds checking). Constant vigilance and repeated testing of personal defenses are the only sure methods of safety.
And safety is a target in motion.
Generally speaking: how many times do you have to make the same mistake before you learn? Only once? Twice?
A hundred times?
Many of the same security problems that existed in IPv4's implementation were not corrected in IPv6 (buffer overflows). One careless programmer can make a hundred thousand problems down the line with a brief lapse of attention (bounds checking). Constant vigilance and repeated testing of personal defenses are the only sure methods of safety.
And safety is a target in motion.
Generally speaking: how many times do you have to make the same mistake before you learn? Only once? Twice?
A hundred times?
Re: Voice;
Re: Voice;
Re: Voice;
It is almost never a good idea, yet most of us do it anyway because we cannot help ourselves.
Re: Voice;
Ah, a completely unrelated example.
[not fooling anybody]
Re: Voice;
[...okay, so she was. But only because:]
Not really.
I did the same thing.
Voice; encrypted
Re: Voice; encrypted
It is hardly a secret.
Re: Voice; encrypted
Re: Voice; encrypted
Then he left.
Voice; encrypted
I'm sorry, Midii.
Voice; encrypted
Voice; encrypted
...You are not alone here.
Voice; encrypted
It is not the same, though.