And rotating a compromised authenticator can be a bitch.
On Aug 6, 2010 8:04 PM, "Dan Kaminsky" <[email protected]> wrote: > Anything can be a biometric. The problem is we leak the damn things all > over the place. > > On Fri, Aug 6, 2010 at 8:18 PM, Rob, grandpa of Ryan, Trevor, Devon & Hannah > <[email protected]> wrote: > >> http://www.photographyserved.com/Gallery/Your-beautiful-eyes/428809 >> >> ====================== (quote inserted randomly by Pegasus Mailer) >> [email protected] [email protected] [email protected] >> After the rush is over, I'm going to have a nervous breakdown. >> I've worked for it, I owe it to myself, and nobody is going to >> deprive me of it. >> victoria.tc.ca/techrev/rms.htm blog.isc2.org/isc2_blog/slade/index.html >> http://blogs.securiteam.com/index.php/archives/author/p1/ >> http://www.infosecbc.org/links http://twitter.com/rslade >> _______________________________________________ >> Fun and Misc security discussion for OT posts. >> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec >> Note: funsec is a public and open mailing list. >>
_______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
