On 9 Oct 2018, at 9:49pm, Warren Young <war...@etr-usa.com> wrote:

> Also: This list may be an unusually juicy target, given the number of places 
> SQLite is deployed.

The minute SQLite gains any sort of internet connectivity, a hundred thousand 
man-hours of cracking attempts will be launched.  Which is why it's great the 
way it is.  Back door access to every mobile phone's contact list ?  That's 
monetised-hacker heaven.

As Fossil gains TCP, sockets, streams, or anything else, it becomes a more 
tempting target.  But the biggest dangers are more difficult, and take longer, 
to exploit.  And I'm not going to discuss them publicly.  Nevertheless, it's a 
less tempting target than SQLite.

The best protection is that all source code is public.  Anyone who thinks 
there's vuln can raise it, and ten people will evaluate it while the USA is 
still asleep.

Simon.
_______________________________________________
sqlite-users mailing list
sqlite-users@mailinglists.sqlite.org
http://mailinglists.sqlite.org/cgi-bin/mailman/listinfo/sqlite-users

Reply via email to