Hi Maddish
Yes, I agree: from a users perspective a unused vulnerability and zero
day can be seen as a "potential" thread or "potentially insecure".
As a person working in the field of IT security and cryptography an
*unused* flaw is regarded as a feasible and, - therefore, - already
exploited defect.
How do you define "cloud software" and "cloud application"?
https://blog.lix.cc/blog/2016/10/26/cloud-2-0/
"All your base are belong to us" ;)
Best,
Lix
--
Lx // 40AD 1EA7 F945 D307 7CB0 2783 3D83 4D8D 18F8 0934
"so long and thanks for all the fish"
On Thu, Jun 08, 2017 at 04:43:10PM +0200, maddish wrote:
> El 08/06/17 a las 11:55, Alex Antener escribió:
> > Well, it's not that I would point to some specific vulnerabilities, but
> > consider "exposing" your files through a *PHP* webservice as "defective
> > by design.
>
> So I would say that they are 'potentially' insecure rather that
> 'completely'...
>
> But I get your point...big old debate :-P
>
> > Further I understand the concept of any cloud service as an architecture
> > of "Big Dada". ;)
> I understand that if you host your cloud's software it is not a service.
> It's a cloud application.
>
> Maddish
>
>
> > My 2 cents,
> >
> > Lix
> >
> >
> >
> > _______________________________________________
> > list_criptica mailing list
> > list_criptica@???
> > Lista de correo de debate de Criptica
>
> _______________________________________________
> list_criptica mailing list
> list_criptica@???
> Lista de correo de debate de Criptica