Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Christian Sciberras (uuf6429gmail.com)
Date: Tue May 18 2010 - 07:38:47 CDT
That is because it is a hardware protocol. But that doesn't mean
applications can't have their own protocol, or use a standard one such as
As a comparison, it is like https/ssl vs tcp/ip protocol.
On Tue, May 18, 2010 at 2:02 PM, Gregor Schneider <rc46figooglemail.com>wrote:
> On Tue, May 18, 2010 at 11:39 AM, <Valdis.Kletnieksvt.edu> wrote:
> > The fact that most devices do it doesn't mean it's not a security flaw.
> AFAIK the USB-protocol does not contain any authorization /
> Please correct me if I'm wrong...
> just because you're paranoid, don't mean they're not after you...
> gpgp-fp: 79A84FA526807026795E4209D3B3FE028B3170B2
> gpgp-key available
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/