Exploration Through ExampleExample-driven development, Agile testing, context-driven testing, Agile programming, Ruby, and other things of interest to Brian Marick
|
Mon, 27 Feb 2006The responsible among you will be using software with "a number of security vulnerabilities [...]. Although the vulnerabilities are serious, they are all easily fixable." A cynical person—not me!— might take "a serious flaw in the key management of the crypto code" which "was openly published two and a half years ago in a famous research paper, and is now known by anyone who follows election security, and can be found through Google"—but is not yet fixed—to suggest that the bugs, including that one, might not be allocated the "few hours [required] to do the whole job" any time soon. Have no fear, though, since "the security issues are manageable by a reasonably careful combination of short-and long-term approaches." I'm sure that everyone involved is reasonably careful at all important times. Have fun! |
|