Stories
Slash Boxes
Comments
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
 Full
 Abbreviated
 Hidden
More | Login | Reply
Loading... please wait.
  • Hmm (Score:3, Insightful)

    by jdavidb (1361) on 2003.09.16 8:31 (#24225) Homepage Journal

    Never heard of lsh before. Does having lsh as the first solution suggest to anyone besides me that this is an attempt to beef up one project's marketshare at the expense of another?

    If it's real, it'll make slashdot. If ssh has the exploit but lsh doesn't, then ssh will be fixed. If it's unfixable, both are broken, and a new protocol will be invented. If it's an aspect common to all security protocols, we're hosed and there's no such thing as encryption anymore.

    No biggie.

    --
    J. David works really hard, has a passion for writing good software, and knows many of the world's best Perl programmers