Comment Re:How pointless is that (Score 4, Insightful) 183
I see we're well into the "extend" phase now.
I see we're well into the "extend" phase now.
Oh, what a brave new world, that has uniquely shaped plastic headlights for every model of car on the road, that cost hundreds of dollars each to replace and throw light in shitty to moderately ok patterns until the plastic yellows and hazes up with age.
And what about the folks whose success and bonuses are measured by units shipped?
You must be new here... Why sell one significantly upgraded product when you can sell two incremental upgrades instead?
A strong argument against our government agencies actively backdooring stuff (cisco hardware, AES, key escrow, etc) and passively maintaining an arsenal of zero day exploits is that these things will be leaked or discovered independently and used by adversarial states against our companies and citizens.
It's happened a bunch.
Now some companies catch China doing it. They protect themselves, turn over the details to three-letter-agencies, and deny it ever happened so that the exploit can be added to the national arsenal of weaponized vulnerabilities.
Good times.
Would they re-invent WINE or become contributors to it?
Wait, what?
Help me understand this.
So if I want a domain name for a business (I do) and that domain is currently owned by a squatter (it is) and that squatter wants $2k for it (he does)...
I can just register trademark the name and force it to be transferred to me without compensating the troll?
While walking along in desert sand, you suddenly look down and see a tortoise crawling toward you. You reach down and flip it over onto its back. The tortoise lies there, its belly baking in the hot sun, beating its legs, trying to turn itself over, but it cannot do so without your help.
You are not helping.
Why?
You're driving a car down the road.
Do you make decisions solely based on what's directly in front of your bumper?
Or do you make decisions drawing from years of experience driving cars and what you see to either side and in the rearview mirror and your side mirrors and what you see further down the road and, dare I say it, common sense?
Because it's impossible to have arbitrary code execution vulnerability in rendering software, and nor has anyone in history ever chained exploits together to achieve a desired outcome?
Oh, wait-
https://security.stackexchange...
And chaining vulnerabilities is very common.
What are the security implications of letting web sites run arbitrary code on your GPU?
I bet they're more significant than you're expecting.
So they're targeting the non-SSL versions of services.
And SNMP being included is somehow a mystery? If you were the sort who wanted illicit access to people's systems, networks, and communications why wouldn't you want to also catch their SNMP strings? It's notoriously insecure yet shockingly common; a great way to dig deeper into a compromised site.
Found the astroturfer.
From "do no evil" to adopting MicroSoft's Embrace, Extend, Extinguish strategy.
They proved it works with their handling of RSS and now they're moving on to "extending" the web where people can either comply with Google insinuating itself as the main (or sole) arbiter of identity or else get de-ranked in search results.
It's the end of the web as we know it.
"If I do not want others to quote me, I do not speak." -- Phil Wayne