The logical conclusion of placing "don'thackmebro!" tokens on sensitive computers is that every GOV computer even remotely concerned with the notion of the critical infrastructure will have it leaving your adversary no choice to ignore them. -- Konrads Smelkovs Applied IT sorcery.
On Mon, Mar 14, 2016 at 3:31 PM, dave aitel <[email protected]> wrote: > http://cybersecpolitics.blogspot.com/2016/03/cyber-norms-futility-of-blacklisting.html > > If you disagree with this post, please spam here instead of twitter, > which has only terse horribleness as its argument protocols. :) > > -dave > > _______________________________________________ > Dailydave mailing list > [email protected] > https://lists.immunityinc.com/mailman/listinfo/dailydave _______________________________________________ Dailydave mailing list [email protected] https://lists.immunityinc.com/mailman/listinfo/dailydave
