Adam Back [ARCHIVE] on Nostr: 📅 Original date posted:2014-04-16 📝 Original message:Not to get snarky or OS ...
📅 Original date posted:2014-04-16
📝 Original message:Not to get snarky or OS elitist but as I understand it windows security,
even during its support period has been measured in low digit number of days
in the year when is NOT an outstanding known remote root compromise or
combination of remote user compromise + priviledge escalation. Add in
phishing, watering holes, malware and the average windows computer is
probably compromised a dozen times over. Apparently for sometime it was not
easily possible to secure it install boot - install OS, connect to network
to download security updates, IP range scanned and compromised faster than
you can patch it.
Adam
On Wed, Apr 16, 2014 at 05:28:27PM +0200, Wladimir wrote:
> On Wed, Apr 16, 2014 at 5:20 PM, Pieter Wuille
> <[1]pieter.wuille at gmail.com> wrote:
>
> On Wed, Apr 16, 2014 at 5:12 PM, Kevin <[2]kevinsisco61784 at gmail.com>
> wrote:
> > I think we should get to the bottom of this. Â Should we assume that
> xp is
> > not secure enough?
>
> Yes.
>
> It will quickly grow extremely insecure.
> People will be actively analyzing patches to post-XP versions to find
> security problems that are patched there, to see if they can be
> exploited on XP.
> Wladimir
Published at
2023-06-07 15:18:43Event JSON
{
"id": "1660391dcf879ab44385cb523ef531563cb87c56c299ceeba87340b85deedec2",
"pubkey": "ee0fa66772f633411e4432e251cfb15b1c0fe8cd8befd8b0d86eb302402a8b4a",
"created_at": 1686151123,
"kind": 1,
"tags": [
[
"e",
"153e54c1cd9c6f756e6009be5152d0197d3421612e96aadb6f6ad32a1c0af88b",
"",
"root"
],
[
"e",
"ee1f3230463396fcee8d7892997b08effb012d1d278d2cb91289dbd656633ff1",
"",
"reply"
],
[
"p",
"63668ddba0f470fe82a90f8c814a4b097fad7d4ba3e5edf55557f0138ff9e33f"
]
],
"content": "📅 Original date posted:2014-04-16\n📝 Original message:Not to get snarky or OS elitist but as I understand it windows security,\neven during its support period has been measured in low digit number of days\nin the year when is NOT an outstanding known remote root compromise or\ncombination of remote user compromise + priviledge escalation. Add in\nphishing, watering holes, malware and the average windows computer is\nprobably compromised a dozen times over. Apparently for sometime it was not\neasily possible to secure it install boot - install OS, connect to network\nto download security updates, IP range scanned and compromised faster than\nyou can patch it.\n\nAdam\n\nOn Wed, Apr 16, 2014 at 05:28:27PM +0200, Wladimir wrote:\n\u003e On Wed, Apr 16, 2014 at 5:20 PM, Pieter Wuille\n\u003e \u003c[1]pieter.wuille at gmail.com\u003e wrote:\n\u003e\n\u003e On Wed, Apr 16, 2014 at 5:12 PM, Kevin \u003c[2]kevinsisco61784 at gmail.com\u003e\n\u003e wrote:\n\u003e \u003e I think we should get to the bottom of this. Â Should we assume that\n\u003e xp is\n\u003e \u003e not secure enough?\n\u003e\n\u003e Yes.\n\u003e\n\u003e It will quickly grow extremely insecure.\n\u003e People will be actively analyzing patches to post-XP versions to find\n\u003e security problems that are patched there, to see if they can be\n\u003e exploited on XP.\n\u003e Wladimir",
"sig": "7c46d9bc782f91ae78320986219969a4122dc8b4eb205daa307001efddaa0536d15cdf2dad9282be36cb316437d0dc34995bb04395783e26afa3be30f7594eb4"
}