I am sure that you could easily ask VAT Security... since the product
offering is all about verifying the ability to subvert any interface to
gain authorization.

AFAIK VAT has already taken IBM for the trip to discover OS related
vulnerabilities.

Rob Schramm
Senior Systems Consultant
Imperium Group



On Fri, Mar 2, 2012 at 1:00 PM, Edward Jaffe <[email protected]>wrote:

> On 3/2/2012 9:09 AM, David Cole wrote:
>
>> At 3/2/2012 10:25 AM, Edward Jaffe wrote:
>>
>>>
>>> The real question is whether an unintended third party can use the code
>>> to become authorized.
>>>
>>
>> Yes. That absolutely is the "real question".
>> And absolutely, that is what Bill Fairchild's post asserts.
>> So that absolutely is why I am concerned.
>>
>
> The subject line of this thread started off (in the other list) as
> "Program FLIH". Then, you renamed it to, "Program FLIH backdoor - This is a
> criminal breach of security!" Having concerns is one thing; making
> speculative accusations of criminal wrongdoing is quite another. Innocent
> until proven guilty is the American way; not the other way 'round.
>
>
> --
> Edward E Jaffe
> Phoenix Software International, Inc
> 831 Parkview Drive North
> El Segundo, CA 90245
> 310-338-0400 x318
> [email protected]
> http://www.phoenixsoftware.**com/ <http://www.phoenixsoftware.com/>
>
> ------------------------------**------------------------------**----------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to