[148] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

re: what are realistic threats?

daemon@ATHENA.MIT.EDU (Theodore M.P. Lee)
Wed Sep 28 19:43:37 1994

Date: Wed, 28 Sep 1994 15:34:12 -0600
To: www-security@ns1.rutgers.edu
From: tmplee@MR.Net (Theodore M.P. Lee)
Reply-To: tmplee@MR.Net (Theodore M.P. Lee)

OK.  What about trojan horses in
a) ncsa mosaic?
b) ghostview?
c) any or all of X?
d) an http server?
e) emacs/wordperfect/ms word?
f) etc etc

In short, even if the protocols are made as secure as the state
of cryptography will allow us to do, when does the foundation of
sand start to be attacked?

Theodore M.P.Lee                              Consultant in Computer Security
P.O. Box 1718                                 612-934-4532
Minnetonka, MN 55345                          tmplee@MR.Net



home help back first fref pref prev next nref lref last post