Hi,

* Marc Haber ([EMAIL PROTECTED]) [031128 10:55]:
> I would like to know whether the attacker was able to log in to auric,
> even as unprivilieged user. Did she actively try to compromise auric?
> 
> What kind of verification of auric's integrity was done / is planned
> to be done?
> 
> [more questions]

Were these questions answered on debian-private, or did I miss the
answer here? I would really be interested in the answer.


Cheers,
Andi
-- 
   http://home.arcor.de/andreas-barth/
   PGP 1024/89FB5CE5  DC F1 85 6D A6 45 9C 0F  3B BE F1 D0 C5 D1 D9 0C


Reply via email to