A new Mindcraft moment?
A new Mindcraft moment?
Posted Nov 9, 2015 15:47 UTC (Mon) by MarcB (subscriber, #101804)In reply to: A new Mindcraft moment? by ortalo
Parent article: A new Mindcraft moment?
It even has a nice, seven line Basic-pseudo-code that describes the current situation and clearly shows that we are caught in an endless loop. It does not answer the big question, though: How to write better software.
The sad thing is, that this is from 2005 and all the things that were obviously stupid ideas 10 years ago have proliferated even more.
Posted Nov 10, 2015 11:20 UTC (Tue)
by ortalo (guest, #4654)
[Link]
Note IMHO, we should investigate further why these dumb things proliferate and get so much support.
But, more importantly, let's capitalize on this knowledge and secure *our* systems, to show off at a minimum (and more later on of course).
Your reference conclusion is especially nice to me. "challenge [...] the conventional wisdom and the status quo": that job I would happily accept.
Posted Nov 30, 2015 9:39 UTC (Mon)
by paulj (subscriber, #341)
[Link]
That rant is itself a bunch of "empty calories". The converse to the items it rants about, which it is suggesting at some level, would be as bad or worse, and indicative of the worst kind of security thinking that has put a lot of people off. Alternatively, it is just a rant that offers little of value.
Personally, I think there's no magic bullet. Security is and always has been, in human history, an arms race between defenders and attackers, and one that is inherently a trade-off between usability, risks and costs. If there are mistakes being made, it is that we should probably spend more resources on defences that could block entire classes of attacks. E.g., why is the GRSec kernel hardening stuff so hard to apply to regular distros (e.g. there's no reliable source of a GRSec kernel for Fedora or RHEL, is there?). Why does the entire Linux kernel run in one security context? Why are we still writing lots of software in C/C++, often without any basic security-checking abstractions (e.g. basic bounds-checking layers in between I/O and parsing layers, say)? Can hardware do more to provide security with speed?
No doubt there are plenty of people working on "block classes of attacks" stuff, the question is, why aren't there more resources directed there?
A new Mindcraft moment?
If it's only human psychology, well, let's fight it: e.g. Mozilla has shown us that they can do wonderful things given the right message.
If we are facing active people exploiting public credulity: let's identify and fight them.
A new Mindcraft moment?