Silver Bullet Talks with Peiter (Mudge) Zatko
نویسنده
چکیده
P Zatko, better known in the security community as Mudge, was one of the leaders of the L0pht hacker collective, which contributed significantly to the disclosure of serious Internet vulnerabilities and eventually became the security consultancy @stake. He has worked as a division scientist at BBN Technologies, a project manager for DARPA, and a researcher at Google. He’s currently working on a project called the Cyber Independent Testing Lab oratory (Cyber-ITL), a testing organization for computer security mandated by the White House. Tell us about the legendary L0pht. The L0pht started out as a place to store equipment. I think it started primarily with Brian Oblivion and Count Zero’s significant others telling them to get their broken computers out of the hallways and the kitchen sinks. They rented a place with some other friends and their wives and it was a little hangout and a dumping ground for tech stuff. After a while, some of the folks there invited me in, so I paid a little bit of the rent. It was great to hang out with everybody, but I saw too much potential. I was involved in morphing it from a hangout group to becoming kind of like Consumer Reports. We had hardware, software, communications; we were trying to break everything and publish everything because we didn’t want other people to have to struggle to learn how things work the way we did. We wanted other people to say, “Here’s what the L0pht guys published; how can I take it further?”
منابع مشابه
Psychological Security Traps
DURING MY CAREER OF ATTACKING SOFTWARE AND THE FACILITIES THEY POWER, many colleagues have remarked that I have a somewhat nonstandard approach. I tended to be surprised to hear this, as the approach seemed logical and straightforward to me. In contrast, I felt that academic approaches were too abstract to realize wide success in real-world applications. These more conventional disciplines were...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Security & Privacy
دوره 14 شماره
صفحات -
تاریخ انتشار 2016