Hm. I don’t think that’s accurate (as either how I think about it, nor how it works). There are a few lines you could draw where anything beyond one line is definitely bad and anything not beyond a different line is not too bad, but not a single line that does that.
What would convince you that my claim about 5 year old software not being secure (or rephrase that however you want that satisfies what you consider enough of a hack) is correct?
I proposed an experimental test, do you have a better/cheaper one in mind? I realize mine is kind of difficult (and probably the hardware can be faked to make it easier, or just use new hardware), so what would you suggest?
You seem to think about computer security in a very binary manner: pwned or not pwned. In reality it’s, ahem, a bit more complicated.
Hm. I don’t think that’s accurate (as either how I think about it, nor how it works). There are a few lines you could draw where anything beyond one line is definitely bad and anything not beyond a different line is not too bad, but not a single line that does that.
What would convince you that my claim about 5 year old software not being secure (or rephrase that however you want that satisfies what you consider enough of a hack) is correct?
I proposed an experimental test, do you have a better/cheaper one in mind? I realize mine is kind of difficult (and probably the hardware can be faked to make it easier, or just use new hardware), so what would you suggest?