I think I side with Cliff Stoll on this:  You're not doing any favors by 
obscuring the vulnerabilities, because the bad guys already know.  Go ahead and 
talk about them.  Be explicit.  Get that knowledge into the hands of the good 
guys too.

Or put it this way:  ~Some~ of the bad guys know about the holes - the default 
passwords that never get changed, for example.  The solution isn't to minimize 
the number of bad guys who know, because as soon as one knows the exploits will 
begin.  The solution, once that's out, is to maximize the number of good guys 
who know too, so as to maximize the number of systems that are secured.

---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313

/* Unspecified error; smash forehead on keyboard to continue. */

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Nightwatch RenBand
Sent: Tuesday, May 7, 2019 10:50

Publishing "success stories" is a two edged sword.  Don't and other
installations cannot protect against the attach. Do and you spread the idea
among the bad guys.
It would seem that the best solution is:
1) Only discuss with people who have clearances and a "need to know",
2) Come up with a fix immediately
3) Put the fix in required maintenance and require that installations stay
current.  Never mention what is in the fix.
Of course this great power to the vendor comes with great responsibility.
(thanks, Stan Lee)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to