And rotating a compromised authenticator can be a bitch.

On Aug 6, 2010 8:04 PM, "Dan Kaminsky" <[email protected]> wrote:
> Anything can be a biometric. The problem is we leak the damn things all
> over the place.
>
> On Fri, Aug 6, 2010 at 8:18 PM, Rob, grandpa of Ryan, Trevor, Devon &
Hannah
> <[email protected]> wrote:
>
>> http://www.photographyserved.com/Gallery/Your-beautiful-eyes/428809
>>
>> ====================== (quote inserted randomly by Pegasus Mailer)
>> [email protected] [email protected] [email protected]
>> After the rush is over, I'm going to have a nervous breakdown.
>> I've worked for it, I owe it to myself, and nobody is going to
>> deprive me of it.
>> victoria.tc.ca/techrev/rms.htm blog.isc2.org/isc2_blog/slade/index.html
>> http://blogs.securiteam.com/index.php/archives/author/p1/
>> http://www.infosecbc.org/links http://twitter.com/rslade
>> _______________________________________________
>> Fun and Misc security discussion for OT posts.
>> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
>> Note: funsec is a public and open mailing list.
>>
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to