On Tue, 18 Nov 2003 12:26:36 EST, David Maynor said: > I think that may be a bad example as that talks about crypto challenges > as oppsoed to operational security products. There is a big diffrence in > cryptanalysis and bug hunting in firewalls.
"Testing can prove the presence of flaws, but not their absence" -- Dijkstra. The same exact logic of why a crypto challenge doesn't prove anything applies to a firewall challenge as well.
pgp00000.pgp
Description: PGP signature
