Behind Pwn2Own: Exclusive Interview With Charlie Miller

Page 2 - Seeking answers? Join the Tom's Hardware community: where nearly two million members share solutions and discuss the latest tech.
Status
Not open for further replies.
G

Guest

Guest
Sounds to me like a lot of blah-blah and THG trying to help MS recover from the Vista disaster. Hopefully, it won't happen.

Just to elaborate: Windows didn't have a really great security system until Vista SP1, but soon after they got it out the door, the start to claim every other OS is less secure. It's kind of true, but it's temporary, at best.

As said in the article, Linux can have ASLR and sandboxing through extra packages and Snow Leopard will have it, as soon as it's shipped. So, the playing field will be evenly leveled again.

What's MS going to do then?
 
G

Guest

Guest
Charlie, it is not your granny should run the Linux but the PC which should be configured by You, man.
 
G

Guest

Guest
Charlie: At work, I mostly look at application-level security. Most of this is really independent of operating system. For example, source code reviews or reverse engineering binaries doesn't depend much on the operating system.

Tell that to a 5 years old or to my dog, because they will surely believe you, but I don't.
Come on, it's one thing to reverse engineer a windows binary, another thing with linux binary's and a whole other thing with macs.
The same thing goes with source code reviews. You don't have the same functions in every OS, and all three are as different as it gets.
It's either an editing mistake or he was really tired when he said that, because I don't want to say what would be my third option here...
 
G

Guest

Guest
Gentlemen, I do not mean to be rude, but, my perception is that this guy (Charlie) has a lot to share, but the approach of the questions by the interviewer did not help. Let's give a chance to the interviewee next time, please! :)
 
Status
Not open for further replies.