7 Jul
2000
7 Jul
'00
5:17 p.m.
On Fri, 07 Jul 2000 13:55:42 PDT, Dan Hollis said:
If its spoofed it wouldnt get into the blackhole list. Pretty simple.
Simple to say. Hard to secure against a determined attacker. Go and *re*-read Ken Thompson's Turing Award Lecture "On Trusting Trust". Then start thinking paranoid. ;) (What, you haven't read it the FIRST time? Citation: @ARTICLE{Trusting.Trust, author={Ken Thompson}, title={Reflections on Trusting Trust}, journal={Communications of the ACM}, volume=27, number=8, month=Aug, year=1984, pages="761-763" } -- Valdis Kletnieks Operating Systems Analyst Virginia Tech