@dguido We can't ever know.
-
-
-
@scarybeasts It doesn't sound like anyone gave much thought about detection techniques for these flaws. Might be useful discussion. -
@dguido Yeah. They're interesting bugs to abuse if, say, you owned a particularly great firewall... -
@scarybeasts Rather than making claims like that, I'd like to see evidence. IMHO BEAST et al overexposed relative to their actual risk. -
@dguido There is no claim made.
End of conversation
New conversation -
-
-
@WeldPond That's just some hacky code, not in a tool or framework to facilitate attacks. ISPs could track whether its been used in the wild.
End of conversation
New conversation
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.