I wish I could talk about it.  You'll have to find someone who's not bound by 
stuff like employment contracts and trades secrets stuff to tell you the story.



________________________________
From: Skylar Woodward <sky...@kiva.org>
To: Dave Nelson <dnel...@elbrys.com>
Cc: "oauth@ietf.org" <oauth@ietf.org>
Sent: Wednesday, June 1, 2011 1:07 PM
Subject: Re: [OAUTH-WG] Text for Native Applications

On Jun 1, 2011, at 9:43 PM, Dave Nelson wrote:

> for mounting the attack.  I firmly believe that secrets can be
> sufficiently obfuscated in code delivered in binary format without the
> benefit of a symbol table, so as to be sufficiently resistant to
> discovery via disassembly by attackers you'd expect to encounter in a
> typical commercial environment.  I'm not talking about printable

I have empirical evidence to support this. At Yahoo! we devised one of the most 
complex systems I've ever seen in a publicly distributed program (Messenger). 
It was disassembled in 3 days. Scott Renfro (now over with David at Facebook) 
and likely Bill Mills can also vouch for the difficulty of this having also 
studied the case well.

Moreover if a hardware-enforced system like that of Playstation 3 can be 
broken, then so can most systems. The PS3 protection mechanisms are/were very 
sophisticated.

Even if a system is not yet cracked or is very hard, you have to assume it can 
be cracked. History has shown this to be true nearly without exception - at 
least to the point it is not worth considering for the OAuth use cases.

skylar

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to