[WEB SECURITY] honeymonkeys, client honeypots

Jay D. Dyson jdyson at treachery.net
Thu May 19 14:13:17 EDT 2005


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thu, 19 May 2005, Jeremiah Grossman wrote:

> Also, is it safe to assume that the MS honeymonkey's will only be 
> traversing the web using Internet Explorer?

 	I would say that is a fair assumption, yes.  I doubt Microsoft's 
business model includes auditing for issues that impact their competitors.

> Firefox has had its fair share of vulnerabilities recently and it would 
> be nice if someone was doing the same for this browser.

 	I am uncertain whether the Mozilla.org crew has the same wealth of 
resources to engage in a similarly behemoth undertaking as Microsoft does. 
Perhaps if this "honeymonkeys" approach were distributed among volunteers, 
it would be feasible.  Who knows?

- -Jay

    (    (                                                      _______
    ))   ))  .-"There's always time for a good cup of coffee"-.  >====<--.
  C|~~|C|~~| \----- Jay D. Dyson -- jdyson at treachery.net -----/ |    = |-'
   `--' `--'  `-- Pardon me, but am I on the right planet? --'  `------'

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (TreacherOS)
Comment: See http://www.treachery.net/~jdyson/ for current keys.

iD8DBQFCjNdExzN3WIW0edsRAsC0AKC4Ad9v6lYkJXYtJ29+2qNuLC0irQCeIoQn
aP41/y9AqONLHr3qYoHh6aY=
=zR9g
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
The Web Security Mailing List
http://www.webappsec.org/lists/websecurity/

The Web Security Mailing List Archives
http://www.webappsec.org/lists/websecurity/archive/



More information about the websecurity mailing list