fubarobfusco comments on You Can Face Reality - Less Wrong
You are viewing a comment permalink. View the original post to see all comments and the full post content.
You are viewing a comment permalink. View the original post to see all comments and the full post content.
Comments (32)
From information security analyst Joshua Goller, the "Tarksi-Gendlin Litany of Information Security":
This part seems like a mistake. If this component actually does not contain an exploitable bug, my time would be better spent looking for exploitable bugs in other components. Otherwise I can never audit the whole code base.