ljknews wrote: > Analyzing source code is independent of machine architecture. > > My guess is that if a company actually is capable of analyzing > binary code they only do it for the highest volume instruction > sets. > > My guess is that attackers will go after machines they feel are > less protected. > > Efforts which merely change attacker behavior are a waste of time.
Nope. If I'm running x86 boxes, I'd be more than happy to have to attackers move to SPARC. Besides, once a bug is found in the x86 binary, the problem gets fixed in the source and/or compiler. BB _______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. _______________________________________________