On Sun, 27 Jun 2021 at 08:53, Jakob Heitz (jheitz) via NANOG
wrote:
> Finding vulnerabilities and how to exploit them to run malware
> in closed source code is nigh on impossible.
I'm not entirely sure if I understood this statement right.
Of course you are aware that every closed source projec
> Finding vulnerabilities and how to exploit them to run malware
> in closed source code is nigh on impossible.
which explains why it never happens
randy
---
ra...@psg.com
`gpg --locate-external-keys --auto-key-locate wkd ra...@psg.com`
signatures are back, thanks to dmarc header butchery
2 matches
Mail list logo