On Thu, Dec 13, 2018 at 10:02:45AM +0100, Otto Moerbeek wrote:
> On Thu, Dec 13, 2018 at 09:50:31AM +0100, Florian Obser wrote:
> 
> > On Thu, Dec 13, 2018 at 09:25:25AM +0100, Kollar Arpad wrote:
> > > Any creative hints to defend against these kind of threats? 
> > 
> > Your system has been compromised. The attacker is able to replace
> > binaries, you have lost. If your package manager can still tell you
> > that the sshd binary has been replaced that only means that you are
> > dealing with an incompetent attacker.
> > 
> > Throw the computer away. Get a new one. Install from scratch, restore
> > data (and only data!) from backup.
> 
> This assumes you can tell the difference between data and code.
> 
> It's a rather fundamental thing that you cannot tell the difference
> between data and code.
> 
> Data read by a program is interpreted in some way. That's a form of execution.
> 

True. Some people just pick up black smithing. I think they are on to
something...

>       -Otto
> 
> 

-- 
I'm not entirely sure you are real.

Reply via email to