These (from the NIST vulnerability summary) are interesting reading:

http://codahale.com/a-lesson-in-timing-attacks/
https://github.com/rails/rails/commit/1f07a89c5946910fc28ea5ccd1da6af8a0f972a0
https://gist.github.com/codahale/f9f3781f7b54985bee94


On Sat, Feb 9, 2013 at 11:20 PM, Charlie Somerville <
char...@charliesomerville.com> wrote:

> On Saturday, February 9, 2013 12:02:12 PM UTC+11, Mario Visic wrote:
>>
>> after a successful timing attack.
>
>
> aka. this one isn't really that severe. Timing attacks, while
> theoretically possible, are not at all easy to pull off.
>
> --
> You received this message because you are subscribed to the Google Groups
> "Ruby or Rails Oceania" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to rails-oceania+unsubscr...@googlegroups.com.
> To post to this group, send email to rails-oceania@googlegroups.com.
> Visit this group at http://groups.google.com/group/rails-oceania?hl=en.
> For more options, visit https://groups.google.com/groups/opt_out.
>
>
>

-- 
You received this message because you are subscribed to the Google Groups "Ruby 
or Rails Oceania" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to rails-oceania+unsubscr...@googlegroups.com.
To post to this group, send email to rails-oceania@googlegroups.com.
Visit this group at http://groups.google.com/group/rails-oceania?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to