Yep, disappointing move by Google.
-
-
-
According to
@epakskape data from BluehatIL, almost no exploits for a vuln discovered in the 30 days after a patch is available. It doesn’t extend to what the average timeline is for the cases that see an exploit. Obviously we don’t have perfect info, just a data point. - Još 13 drugih odgovora
Novi razgovor -
-
-
Yeah, in the short term that's possibly true. The long-term goal though is to reduce the total time for users to receive a high quality patch on their device, which should ultimately reduce the viability of patch diffing for 1-day. If it doesn't work, we'll rebalance the policy.
-
While I respect the rationale behind the new policy and the decision to put it under a test period, I personally think that this will give offensive parties a huge advantage 1/2
- Još 1 odgovor
Novi razgovor -
-
-
Yeah it definitely increases the value of patch diffing to malicious attackers!!! Because it’s in their best interest to check out the changes in a patch to figure out what the vulnerabilities were and exploit them before the patch & bug info gets widely disseminated!!! Yikes…
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Security Through Obscurity has always worked out sooooo well in the past, why not make it the Defacto Standard for Software Security!!!! SMH!!!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

