Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <e51c6925-1d49-47cf-8dc3-e0dcb01d5005@gentoo.org>
Date: Sun, 28 Sep 2025 12:35:28 -0400
From: Eli Schwartz <eschwartz@...too.org>
To: oss-security@...ts.openwall.com
Subject: Re: How to do secure coding and create secure software

On 9/27/25 11:35 PM, Amit wrote:

> Let's assume that there are 2 (or more) different software and all the
> functions in all the software are secure and these software are interacting
> with each other. Then how can they be hacked? Can someone give an example.
> 
> I don't agree with theoretical assumptions.
> 
> Someone also mentioned that secure functions having limits on arguments can
> result in DoS. In my opinion, DoS is better than getting hacked.
> 
> But still, the main point is that can someone give an example of how a
> software made up of all secure functions be hacked? I request for an
> example (not theoretical statements).
> 
> Or, some example that happened in the past in the real world? I will
> analyze that.


Theoretical assumption: people who think they know how to write secure
functions never discover they were wrong and their functions were buggy
and insecure.

:) :)


-- 
Eli Schwartz


Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (237 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.