On 7/23/2020 7:44 AM, charlie derr wrote:

While it would still *technically* be security by obscurity, it would
seem to me that there's some value to this approach because access to
the compiled binary wouldn't necessarily be easy to obtain (especially
if the sysadmin provisioning the system takes extra efforts to *not*
share it with anyone).  Or am i missing something?


I don't think there is much value because getting access isn't only done by buffer overflows and such on compiled programs. If you can find one then sure you might be able to get root access if the program you break into is running at root. But you can do an awful lot of damage by merely having unprivileged access. All you need is authentication credentials and regular users are horrible about keeping
their credentials private.

In fact the only place I can see a whole lot of value to is the manufacturers of cell phones since companies like Verizon lock the boot
loaders as they do not wish owners of their phones to root them and
get rid of annoying Verizon advertising and other suchlike.   Rooting
those devices is mainly done by breaking into security holes on the phone.

Ted
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to