I can see that there could be the possibility of a compromise if your cryptographic PRNGs are seeded using a process ID.
Does anyone know of any other types of attacks?
Cheers, Brett -- Brett Hutley [MAppFin,CISSP,SANS GCIH] mailto:[EMAIL PROTECTED] http://hutley.net/brett
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
