Defensive programming
Aahz
aahz at pythoncraft.com
Sun Jun 1 20:20:09 EDT 2003
In article <7xn0h11gpu.fsf at ruckus.brouhaha.com>,
Paul Rubin <http://phr.cx@NOSPAM.invalid> wrote:
>
>The paper proposed a good solution, which is use a hash function that
>the attacker doesn't have enough information to manipulate.
As Uncle Timmy pointed out on python-dev, some Python programs run for
literally months -- enough time to deduce the characteristics of the
hash function if someone is inclined. Please read the thread on
python-dev before making further comments in this thread.
--
Aahz (aahz at pythoncraft.com) <*> http://www.pythoncraft.com/
"If you don't know what your program is supposed to do, you'd better not
start writing it." --Dijkstra
More information about the Python-list
mailing list