In message <[EMAIL PROTECTED]>
Per Heldal writes:
>  
>  
> 2. A significant software supplier (e.g. OS vendor) including spoofing
> probes in their SW. [...]


Is this going to happen before or after said OS vendor fixes the many
security flaws in its OS.  How about back versions including now
unsupported versions which still have significant installed base.

Also how much will the upgrade cost and will it run on the old PC with
16MB of RAM that grandma turns on to pick up email once a week.

You've certainly hit on the source of the problem here and there is a
straightforward solution but not one that the end user seems willing
to use (erase disk, install Linux or *BSD).  Not something grandma
will want to try.

I often wonder what the effect would be of fining the end user if
their machine was used in an attack, even if through no fault of their
own other than using security flawed software and what market
reprocussions that might have on the source of this flawed software.

Tough medicine to swallow but it may be what the patient needs.  Some
side effects.

Curtis

ps - grandma has about as much clue as many "IT professionals".

_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area

Reply via email to