Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yes, and robbing a bank to show that the security is lax is totally fine because the real criminals don't notify you before they rob a bank.

Do you understand how dumb that sounds?



Please review https://news.ycombinator.com/newsguidelines.html and omit name-calling and swipes from your comments here. See also https://news.ycombinator.com/item?id=26893776.

We detached this subthread from https://news.ycombinator.com/item?id=26890035.


> Do you understand how dumb that sounds?

If you make a dumb analogy, that's on you.


Same analogy... there's a vulnerability and you want to test it? Go set up a test, and notify the people.

You really think the Linux kernel guys would change their process if you did this? They'd still do the same things they do.


> Go set up a test, and notify the people.

The vulnerability is in the process, and this was the test.

> You really think the Linux kernel guys would change their process if you did this? They'd still do the same things they do.

If they're vulnerable to accepting patches with exploits because the review process fails, then the process is broken. Linux isn't some toy, it's critical infrastructure.


You can test the process without pushing exploits to the real kernel.


> You can test the process without pushing exploits to the real kernel.

No, you can't, because that is the test! If you manage to push exploits to the real kernel, the test failed. If you get caught, the test passes. They did get caught.


You totally can... contact the kernel maintainers, tell them you want them to review a merge for security and they can give you a go/no go. If they approve your merge, then it's the same effect as purposely compromising millions without compromising millions.


Again, that's not the same, because then they will look for problems. What you want to test is that they're looking for problems all the time, on every patch, without you telling them to do so.

If they don't, then that's the vulnerability in the process.


> because then they will look for problems. What you want to test is that they're looking for problems all the time, on every patch, without you telling them to do so.

That's what they do every time.


Telling them in advance will potentially make them more alert for problem coming from specific source. It will introduce bias.

The best they can do is notify the maintainers after they got the result for their research and give the maintainers an easy way to recover from vulnerability they intentionally create.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: