Contributed by jose on from the everyone's-adopting-it dept.
http://www.microsoft.com/billgates/speeches/2004/02-24rsa.asp "
Good to see a few others starting to think in the same terms as OpenBSD's philosophy.
(Comments are closed)
OpenBSD Journal
Contributed by jose on from the everyone's-adopting-it dept.
http://www.microsoft.com/billgates/speeches/2004/02-24rsa.asp "
Good to see a few others starting to think in the same terms as OpenBSD's philosophy.
(Comments are closed)
Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]
By Christopher () on
Comments
By Anonymous Coward () on
Comments
By Brad () brad at comstyle dot com on mailto:brad at comstyle dot com
Comments
By Anonymous Coward () on
You're right MS may copy OpenBSD to their content, but isn't security about building from the ground up and being open? Until they do so, it doesn't matter what they say, or copy. This is why OpenBSD is on top in security.
Comments
By grey () on
As everyone loves to parrot Schneier - security is a process. Whether that process involves building from the ground up, I couldn't say - but if it is, then OpenBSD has already failed. And where exactly does the ground start anyway, at the application? The OS? What about the BIOS, device firmware, microcode, hardware?
OpenBSD has a good security track record, but it did not reinvent the wheel; and it is naive to think that other organizations (particularly those with billions of dollars to implement policy decisions) could not also excel as well. MS has a lot of reasons to make security a top priority now, and while currently the public opinion about MS software is horrendous - you don't have to look too far back in history to see that Unix was once viewed in the same eyes of educated, clean code writing folks. Reading the unix hater's handbook you'll see such polemics as " Unix. The World's First Computer Virus" and "Creators Admit C, Unix Were Hoax").
Anyway, the point I'm getting at is that given its history, OpenBSD really wasn't built from scratch - and security really has little to do with that so much as developers following an intention to be secure. Read the old CVS logs for the goals of the project, security wasn't one of them until later on. And for the few nowadays who have bothered to read core.mail or delve into some of the history of OpenBSD, much of the impetus for focusing on security was due to compromises to theo's machine(s).
In summation, just like anything in life - the process of security comes from continued improvement, working to fix known problems rather than letting them stagnate. MS appears to be picking up the pace on this one focus; and by the same tolken, it's not a guarantee that OpenBSD will always have, or be able to maintain the same kind of intent.
By Anonymous Coward () on
By Anonymous Coward () on
A more secure MS-Windows can only be a good thing for the world.
By Brad () brad at comstyle dot com on mailto:brad at comstyle dot com
Comments
By Anonymous Hero () on
By Kurt Miller () on
By Anybody () on
Yeah, can we have a "firewall" in OpenBSD ?
How about "pop-up blocking" ?