-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 18/07/14 01:02, coderman wrote:
as thought experiment: a hidden site is setup by presumed
trustworthy experts. exploits are funneled there, then they all
dry up.
- congratulations! NSA is out of 0day! ? - congratulations! NSA is
not using
On 07/20/2014 11:00 AM, Michael Rogers wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 18/07/14 01:02, coderman wrote:
as thought experiment: a hidden site is setup by presumed
trustworthy experts. exploits are funneled there, then they all
dry up.
- congratulations! NSA is out of
On Sun, Jul 20, 2014 at 8:00 AM, Michael Rogers
mich...@briarproject.org wrote:
...
Assuming the effort doesn't stop when exploits dry up, but instead
looks for new ways to attract exploits, what's the problem?
the problem is you assume this is easy.
look for new ways to attract exploits is a
On Thu, Jul 17, 2014 at 2:57 PM, Griffin Boyce grif...@cryptolab.net wrote:
...
Solidarity is really important here. Increased security for those
who actively set honeytraps doesn't really scale at all, and most
people will never reap the rewards of this work. =/
it doesn't scale at all,