Verily I say unto thee, that Roy Schestowitz spake thusly:
> How To Argue That Open Source Software Is Secure?
>
> ,----[ Quote ]
> | ... This week I received calls from four different customers saying
> | that they were warned that they are dangerously insecure because
> | they run open source operating systems or software, because 'anyone
> | can read the code and hack you with ease.'
> `----
Standard response...
Here's a GPG encrypted message:
-----BEGIN PGP MESSAGE-----
Version: GnuPG v1.4.7 (GNU/Linux)
hQQOA18Su0lu6wAlEA/7BNm7nqdMVmiOHIk8gB8u732Cl4LxuCkTof6FkvX8PtaW
6Yy36FbCt1GTcMWD70O9Do6H/Tl4WqdTCCeUNGbogLNoQfeqVo4MSE3QfDl+P/f5
3eoFk0VFM2O3Hf+F39XSAXq0BIxEvzppmRMTn4zR1I8GTnQ93AGS2yqnYFEEj32I
MRv5S6uuIRv/Do8MCSbXlFZxZEu92F01TJqSPQHVAnI7BzUrQdKmG4qRrZstDym6
mIZwjO+pCpMTlR5OBeaHkev24BLqaf1ASJ/DjeVdAWmSKjYqWjBWPH6RraTvLNlc
Ic6J46QmZoXCjEsDFXBXkUnr3++WdaiI4/1SyOES30Ssl920wxorYA8HiVG4RbXe
ZpcLLBG6EzsWq58wQx/M9BKsUyEChAHBwBEqJ9sPB+si2L49KcswSO4pL1BivFo7
eu2UabQFYziFXF52foSe68KuX5BLYzDFzB6J4eGoHGnBTtWZP2nC46VVT4rM25JO
Qtt62MIG5TJwC6Zw/w+oibRrMiJdHYCof442VzBQOxrXM27/K4Kp3hvl5yKMihP4
drSBTFe9Am4TAVRV7u9F+tehVQxDRq+FknsJ4oU9J1VEF3ZHTXIHEuF7vs1zGsYF
YAsz7ILZ6DmN3jIuotvOn9u8/BEAqJyBMy/ZA5ETyoqMq+2uLZYq3VIU2xyib+gP
/jE3gUR4qp9GJyXxOMTvkDN+Ez7HZQ4L1znE74EL9zQiOb4UE04FPQu9qq1wWmAY
MmZHqWcEuUV2NfvUN+Zw2hqImA+Rx3rtptYeneh1FTfZgDwzJN/pLvjC9jja9Gld
5IIrEPjpDu7CguF9UCql42AOMibEmuXPgAHuW5l2xi6mcgEOs0ALNgzdTtw++FEp
+ZnqZwSKwfoBfsMS+ZWvcdwC15gdYd6WMnQoujS5kOQNzA08uRSQ8wjzFD73ubHC
AqNiu4/Xxqp3NbG0omO+DICQab55YatvIIIaH77OgIr1VF6rMJq1+LZbb6WgJPS1
cIfhiL4ZKS9kG0Z++ORUT3tSN2jQvupqL+hj9KqVLjsddF1+aU+uJspdrbTrHe+O
pEo2eRx42TBXalax8lBc7grstPy36xi6pvwvS1GaBbODJXmNkt0Eq4aRviwLLqn2
WL0OrgEwoovXThwY+yliJ0svfrsnpfA83bMYv62EwdBnC8MmoZOsSZ4Dh2S0Semh
RBh8XBhYplwD1GrVo2GQKkh8p0M5VupZvw4JBccZM65Y1sDpK8tYOMGESMFaHnok
tHlu0FiQDM419RWTGoU91emIcGF7J5cAPQJS/EnUgPZSczFrFKyQ1nizbjAWxmPT
ykqkb3pFgsdRZVdFRosCxq5tV0sDJd9rXG6Di68+fCsU0rcBryrslbLHoj60YQRz
PsjuE/Wp868IqQR9oG0VYw3UUHFefgaz5k3rV8sjJoZDR0pUhpxgrwLsKRnXNU1a
qlByOreYycnAyqVoC5yTqCb7UqKt1ISfINmkLnKvP78t8EJCc9sVfINjhpcGaL9e
L/RXd98okQ/rwF9hC9IYwT8ZGvl74aOD8yxezYhNWzaP3bFvA3L7Ojqa595bZHwN
vQr+1flDp/29FgvP1nvPug/dGn5MdwDOOJc=
=ertO
-----END PGP MESSAGE-----
Here's the sources for GPG:
ftp://ftp.gnupg.org/gcrypt/gnupg/gnupg-1.4.9.tar.bz2
According to the above ISV's logic, they should now have everything they
need to decrypt that message.
Good luck.
--
K.
http://slated.org
.----
| "Necessity is the plea for every infringement of human freedom. It
| is the argument of tyrants; it is the creed of slaves." ~ William
| Pitt the Younger
`----
Fedora release 8 (Werewolf) on sky, running kernel 2.6.25.11-60.fc8
21:37:40 up 99 days, 5:20, 4 users, load average: 0.27, 0.25, 0.20
|
|