The logical conclusion of placing "don'thackmebro!" tokens on
sensitive computers is that every GOV computer even remotely concerned
with the notion of the critical infrastructure will have it leaving
your adversary no choice to ignore them.
--
Konrads Smelkovs
Applied IT sorcery.


On Mon, Mar 14, 2016 at 3:31 PM, dave aitel <[email protected]> wrote:
> http://cybersecpolitics.blogspot.com/2016/03/cyber-norms-futility-of-blacklisting.html
>
> If you disagree with this post, please spam here instead of twitter,
> which has only terse horribleness as its argument protocols. :)
>
> -dave
>
> _______________________________________________
> Dailydave mailing list
> [email protected]
> https://lists.immunityinc.com/mailman/listinfo/dailydave
_______________________________________________
Dailydave mailing list
[email protected]
https://lists.immunityinc.com/mailman/listinfo/dailydave

Reply via email to