In message <[EMAIL PROTECTED]> Per Heldal writes: > > > 2. A significant software supplier (e.g. OS vendor) including spoofing > probes in their SW. [...]
Is this going to happen before or after said OS vendor fixes the many security flaws in its OS. How about back versions including now unsupported versions which still have significant installed base. Also how much will the upgrade cost and will it run on the old PC with 16MB of RAM that grandma turns on to pick up email once a week. You've certainly hit on the source of the problem here and there is a straightforward solution but not one that the end user seems willing to use (erase disk, install Linux or *BSD). Not something grandma will want to try. I often wonder what the effect would be of fining the end user if their machine was used in an attack, even if through no fault of their own other than using security flawed software and what market reprocussions that might have on the source of this flawed software. Tough medicine to swallow but it may be what the patient needs. Some side effects. Curtis ps - grandma has about as much clue as many "IT professionals". _______________________________________________ Int-area mailing list [email protected] https://www1.ietf.org/mailman/listinfo/int-area
