The Anti-Sec movement - Page 4
Forum Index > General Forum |
Shizuru~
Malaysia1676 Posts
| ||
Telemako
Spain1636 Posts
Full disclosure requires that full details of a security vulnerability are disclosed to the public, including details of the vulnerability and how to detect and exploit it. The theory behind full disclosure is that releasing vulnerability information immediately results in quicker fixes and better security. Fixes are produced faster because vendors and authors are forced to respond in order to save face. Security is improved because the window of exposure, the amount of time the vulnerability is open to attack, is reduced. by Wikipedia | ||
Jusciax
Lithuania588 Posts
On July 12 2009 23:34 ThaddeusK wrote: not really, its just that they view hacking as something that should be done for fun/as a hobby rather than as a job, saying that they didnt manage to grow up and adapt is like saying the people who play starcraft but are not progamers didnt grow up and adapt (my point being that doing something for a job doesnt have to be the end result of having a hobby, sometimes you just do it for fun) although you are right, it doesnt justify what they are doing. But you aren't pissed at others who took starcraft gaming to pro level and make a living out of it, are you? That was my whole point (or at least that's what i got from that post) that hackers think others who took it to next level (used their knowledge to get a job in security firms) are somehow sellouts and not respected anymore. Which is why i found that view childish and laughable. | ||
stafu
Australia1196 Posts
| ||
Asta
Germany3491 Posts
If you'd have read it, you might have a) learned something interesting/important, even if you decided they were wrong and b) discovered that "no images were harmed", so you wouldn't have had to reupload your images or anything. | ||
Mooga
United States575 Posts
On July 12 2009 16:43 Badjas wrote: That didn't answer the question. Wait perhaps I was a bit unclear. So most exploit discoveries come from black hats, not from white hats? Where's your source? I was probably unclear - all I was trying to say is that whomever discovered the exploit is irrelevant to the question of which scripts script kiddies use. If you want to let script kiddies hack security systems, then you have to basically write every line of code for them in order to make that possible because that's all script kiddies do... they download programs from hackers and run those scripts on everything. White-hat hackers do not explicitly make programs to help script kiddies execute exploits. So that's what I meant by needing black-hats or grey-hats to exploit. | ||
| ||