'“In other words,” The Register’s Lew Page notes, “any code you write,
perhaps even any document you create, might one day be traceable back
to you - just as your DNA could be if found at a crime scene, and just
as it used to be possible to identify radio operators even on
encrypted channels by the distinctive ‘fist’ with which they operated
their Morse keys. Or something like that, anyway.'

This makes great copy but it doesn't sound like they've heard about,
or bothered to take into consideration:

JITs
Automated code generation
Optimizers

Or a slipperier issue:

Just because someone wrote the code doesn't mean they launched the attack.

This idea has been hyped before without result. I don't expect that to
change any time soon.

-r

On Tue, Jan 26, 2010 at 17:58, Larry Seltzer <[email protected]> wrote:
>>> One of the trickiest problems in cyber security is trying to figure
>>> who’s really behind an attack. Darpa, the Pentagon agency that created
>>> the Internet, is trying to fix that, with a new effort to develop the
>>> 'cyber equivalent of fingerprints or DNA' that can identify even the
>>> best-cloaked hackers.
>
>>> http://www.wired.com/dangerroom/2010/01/pentagon-searches-for-digital-dna-to-identify-hackers/
>
> How much luck can they actually have with this?
>
> Larry Seltzer
> Contributing Editor, PC Magazine
> [email protected]
> http://blogs.pcmag.com/securitywatch/
>
>
> _______________________________________________
> Fun and Misc security discussion for OT posts.
> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
> Note: funsec is a public and open mailing list.

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to