On Jun 1, 2011, at 9:43 PM, Dave Nelson wrote:

> for mounting the attack.  I firmly believe that secrets can be
> sufficiently obfuscated in code delivered in binary format without the
> benefit of a symbol table, so as to be sufficiently resistant to
> discovery via disassembly by attackers you'd expect to encounter in a
> typical commercial environment.  I'm not talking about printable

I have empirical evidence to support this. At Yahoo! we devised one of the most 
complex systems I've ever seen in a publicly distributed program (Messenger). 
It was disassembled in 3 days. Scott Renfro (now over with David at Facebook) 
and likely Bill Mills can also vouch for the difficulty of this having also 
studied the case well.

Moreover if a hardware-enforced system like that of Playstation 3 can be 
broken, then so can most systems. The PS3 protection mechanisms are/were very 
sophisticated.

Even if a system is not yet cracked or is very hard, you have to assume it can 
be cracked. History has shown this to be true nearly without exception - at 
least to the point it is not worth considering for the OAuth use cases.

skylar

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to