No one claims otherwise "(...) it is bypassable by design (albeit sometimes at the expense of more complicated and/or less reliable exploits) (...)". AFAIK, all of the anti-exploitation / security technologies (including mitigations) follow the same path and are bypassable.
Nobody argues they're mutually exclusive. Just like homeopathy isn't mutually exclusive with antibiotics. They both have limitations, for example antibiotics can't reattach severed limbs, so it's fair to list them in the same class as homeopathy.... right?
-
-
The 'detection' side of our industry should pack it up because the past 20 years of mitigation progress has solved practical security. Again, working towards technically secure, trustworthy computing is the holy grail. No argument there. The current reality is pwn'd by Powershell
-
Should the homeopaths pack it up because the past 20 years of western medicine haven't cured all disease? Umm, yes.

- 21 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.