Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <aNqeyW7Yp2m62m6q@yuggoth.org>
Date: Mon, 29 Sep 2025 14:59:21 +0000
From: Jeremy Stanley <fungi@...goth.org>
To: oss-security@...ts.openwall.com
Subject: Re: How to do secure coding and create secure software

On 2025-09-29 09:01:26 +0530 (+0530), Amit wrote:
[...]
> The function body should also be secure.

This generalizes to a tautology: The software is secure if the 
software is secure. It's true, of course, as are all tautologies, 
while also being a useless assertion.

> After writing code, you should review your code for security 
> issues and also get it peer reviewed for security issues. In 
> general, you should always get your code peer reviewed for 
> security issues, bugs, company coding guidelines, etc.
[...]

While excellent advice, this does not guarantee security (all of the 
vulnerability reports I oversee are for software where every change 
has been reviewed and approved by multiple competent developers 
before merging, but humans are not perfect either).

Not to insult your work or ideas, but sadly this has the hallmarks 
of what the scientific and mathematical communities would refer to 
as "crank" or "crackpot" theory so I don't think anyone on this 
mailing list continuing to engage with you is likely to solve your 
misunderstandings. In time, hopefully, you'll gain a greater 
perspective on software security and come to realize why this is not 
as simple as you keep asserting.
-- 
Jeremy Stanley

Download attachment "signature.asc" of type "application/pgp-signature" (964 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.