[148] in WWW Security List Archive
re: what are realistic threats?
daemon@ATHENA.MIT.EDU (Theodore M.P. Lee)
Wed Sep 28 19:43:37 1994
Date: Wed, 28 Sep 1994 15:34:12 -0600
To: www-security@ns1.rutgers.edu
From: tmplee@MR.Net (Theodore M.P. Lee)
Reply-To: tmplee@MR.Net (Theodore M.P. Lee)
OK. What about trojan horses in
a) ncsa mosaic?
b) ghostview?
c) any or all of X?
d) an http server?
e) emacs/wordperfect/ms word?
f) etc etc
In short, even if the protocols are made as secure as the state
of cryptography will allow us to do, when does the foundation of
sand start to be attacked?
Theodore M.P.Lee Consultant in Computer Security
P.O. Box 1718 612-934-4532
Minnetonka, MN 55345 tmplee@MR.Net