Uh, you are almost certainly thinking of someone else. The 1853 that Katie mentioned was a reference to Alfred Hobbs, a Victorian locksmith who wrote about vulnerability disclosure. Perhaps you're thinking of Thomas Hobbes?
-
-
Oh, you are right! Maybe he'll be not as boring!?
1 reply 0 retweets 1 like -
I think he's pretty interesting, but the point was that the discussion hasn't changed in 150 years. If we were to change "hackers" to "rogues", he would have understood tweets from yesterday
1 reply 0 retweets 7 likes -
The discussion hasn’t changed at all? So the people that discuss the idea of a restricted system are operating on the exact same principles and context that they were the last time it became a big debate?
3 replies 0 retweets 2 likes -
Replying to @uncl3dumby @taviso and
There’s never been improvements for the industry as a result of hashing things like the OST debate out?
1 reply 0 retweets 0 likes -
Sure, a century ago when the problem was new and these ideas were being explored for the first time. Does having the same debate every few weeks improve things? If you think so, be my guest, but I don't think it does, and they're so repetitive that I'm tired of them
2 replies 0 retweets 6 likes -
I’m genuinely curious how you’re forced to participate? Surely you ignore many popular things in your timeline.
2 replies 0 retweets 0 likes -
Replying to @uncl3dumby @taviso and
I don’t want to dismiss how much it may impact you, but I’ve been involved in this community for years have learned *a lot* from the most recent discussion. I personally never seen it taken to such a degree. It has been incredibly helpful for me.
1 reply 0 retweets 1 like -
That's wonderful, please remember to let me know if you feel the same way after the twentieth time.
2 replies 0 retweets 4 likes -
Replying to @taviso @uncl3dumby and
I don't think you release Offensive Security Tools (OST), do you? I was under the impression your research focuses on vulnerabilities, and the exploits of those vulnerabilities. Specifically of the presently unidentified kind (0-days). OSTs do not involve a software flaw.
1 reply 1 retweet 0 likes
Is metasploit an offensive security tool?
-
-
Replying to @taviso @uncl3dumby and
Metasploit in aggregation is an Offensive Security Tool. The exploits contained within are not Offensive Security Tools.
2 replies 0 retweets 3 likes -
Replying to @anthomsec @QW5kcmV3 and
"OSTs do not involve a software flaw"pic.twitter.com/7Rf3cBE4UT
1 reply 0 retweets 3 likes - 41 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.