On Thursday, August 25, 2022 at 4:58:18 PM UTC+8 Gopher-Insane wrote:

> Thank you kortschak, yes that was all I was doing. Seeking advice from 
> people who have better knowledge than me in this area. Again, very grateful 
> for everyone's help. 
>
> On Thursday, 25 August 2022 at 09:54:13 UTC+1 kortschak wrote:
>
>> On Thu, 2022-08-25 at 01:47 -0700, Holloway Kean Ho wrote: 
>> > What exactly you're trying to achieve by taking a very elaborated, 
>> > crystal-clear, good-willed security-related article way out of its 
>> > context with your thread title here and agitate some of the Go 
>> > maintainers here? 
>>
>> I don't think that's what the OP was doing. Bill Kennedy suggested they 
>> ask here, and I think that they have enough information/ideas to take 
>> back to their security team to address the misconceptions that they 
>> have. 
>>
>> All right. In that case, you can point the same article's 2nd last 
paragraph which is very self-explainatory.

This book (§1, §2, and §7.5) should give you a quick 
basic: 
https://www.cs.ox.ac.uk/andrew.ker/docs/computersecurity-lecture-notes-mt2014.pdf

This book should you give you a rough idea about introduction to 
specifically computing security technical aspect. Security itself has a lot 
of 
aspects.: 
http://www.uoitc.edu.iq/images/documents/informatics-institute/exam_materials/Introduction%20to%20Computer%20Security%20pdf%20DONE.pdf

This manual alone 
(https://www.debian.org/doc/manuals/securing-debian-manual/index.en.html) 
can give you an idea that a system security (hardware+software) is about 
controlling quite a large number of aspects and considerations than being 
picky with a programming language is the very last thing to consider.

1 additional point to counter to the counter-argument is: neither one 
(within computing security scope alone) mention specifically of a 
programming language being a threat since most of contents are theorems, 
threat model + countermeasures, practices, etc etc.

The argument about behavorial detection in consumer-product 
AV: https://usa.kaspersky.com/resource-center/definitions/heuristic-analysis
And difference between behavorial detection vs heuristic 
analyis: 
https://security.stackexchange.com/questions/157797/what-is-the-difference-between-heuristic-based-and-behaviour-based-virus-scannin

Of course, given the current geo-political situation, you can search 
"heuristic analysis" of the AV of your choice and find out when they 
started the implementation. For Kas (I used to use it when I was on Windows 
OS long time ago), if I'm not mistaken, it was implemented all the way back 
since the transition from Windows XP to Windows 7 era. The rest of the 
competitors: I'm not aware of it.


> Apologies if this caused offense. That was never the intention. I am a 
big fan of Go myself, and this was raised to me by our Security team. I was 
seeking the advice of experts in the field to help me build an argument. I 
do fully appreciate everyone's help. 
Nahh, no worries. Be careful with framing the title next time. Some forums' 
zealots will skin you alive with that kind of touch.
 

Regards,
Holloway

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/golang-nuts/cda12c2d-d24b-447b-a8dd-72009c62e8bdn%40googlegroups.com.

Reply via email to