> its old news . surprises are for those who do not read history , the ones who 
> doomed to make the same mistakes . all respect to Dave , i do not think 
> exploits are that important .

It is cool when it works and that is the objective. 
Exploits were important in light of stuxnet and the complexities therein. If 
anything , exploits are extremely important. High value exploits can be the 
diplomatic tool to pressure many things on an international scale. 

> its "the stupidity" that's important . its not vulns that are essential to 
> find and turn into exploits, its commercial , its going on for many years on 
> different forms yet same idea .
> its the stupidity we should root out . that's hard , really . putting a bunch 
> of 0days is not .

I guess I would say it a bit differently (still a similar message). 
        - Vulnerabilities always exist , in human form and in code. With a 
dedicated adversary they are looking for a vulnerability to exploit. 
        - Assumptions are the mother of all mess ups. 
        - Input validation and Ego are vulnerability classes that are being 
exploited in both of the topics being explored.... so I guess I may be missing 
your point or fixated on the wrong lines in this email...

BTW, there are a few good examples of human and 'cyber' / supply chain 
compromise in "Gideon's Spies: The Secret History of the Mossad" - Gordon 
Thomas. 

| Daniel Uriah Clemens
| Packetninjas L.L.C | | http://www.packetninjas.net
| c. 205.567.6850      | | o. 866.267.8851 
"Moments of sorrow are moments of sobriety"











_______________________________________________
Dailydave mailing list
[email protected]
https://lists.immunityinc.com/mailman/listinfo/dailydave

Reply via email to