BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] OSX Mavericks root exploit, and Safari
- Subject: [Discuss] OSX Mavericks root exploit, and Safari
- From: dan at geer.org (dan at geer.org)
- Date: Fri, 17 Apr 2015 17:37:35 -0400
- In-reply-to: Your message of "Fri, 17 Apr 2015 17:16:34 -0400." <CAAbKA3UJjVjfjbOe0gJcCz==2yuNvAQQwXdJFPUQ126gWpkF7Q@mail.gmail.com>
... ${PRODUCTS} should be considered dead since they aren't getting critical security patch -- use on other than air-gapped physically-secure systems to be discouraged. <polemic> Suppliers who walk away from their code bases must eventually become subject to the rule of law. On Abandonment, IEEE S&P, July/August 2013 http://geer.tinho.net/ieee/ieee.sp.geer.1307.pdf </polemic> --dan
- Follow-Ups:
- [Discuss] OSX Mavericks root exploit, and Safari
- From: bill.n1vux at gmail.com (Bill Ricker)
- [Discuss] OSX Mavericks root exploit, and Safari
- References:
- [Discuss] OSX Mavericks root exploit, and Safari
- From: bill.n1vux at gmail.com (Bill Ricker)
- [Discuss] OSX Mavericks root exploit, and Safari
- Prev by Date: [Discuss] OSX Mavericks root exploit, and Safari
- Next by Date: [Discuss] OSX Mavericks root exploit, and Safari
- Previous by thread: [Discuss] OSX Mavericks root exploit, and Safari
- Next by thread: [Discuss] OSX Mavericks root exploit, and Safari
- Index(es):