BSD tty security, part 3: How to Fix It

kevin lyda lyda at acsu.buffalo.edu
Sat May 11 16:26:42 AEST 1991


In article <21553:May1020:06:0791 at kramden.acf.nyu.edu> brnstnd at kramden.acf.nyu.edu (Dan Bernstein) writes:
>Those of you who've been shouting religious stupidities
>about how you absolutely need to see break code to be convinced that my
>fixes work---can you see the difference now between a proof of security
>by logic and a ``proof'' of security by testing? (I will address this
>point in detail in a coming message.)

good point....  :)  a file that one of my professors was kind enough to
distribute... sadly, none of these proofs receive credit...

			HOW TO PROVE IT

proof by example:
	The author gives only the case n = 2 and suggests that it 
	contains most of the ideas of the general proof.

proof by intimidation:
	'Trivial'.

proof by vigorous handwaving:
	Works well in a classroom or seminar setting.

proof by cumbersome notation:
	Best done with access to at least four alphabets and special
	symbols.

proof by exhaustion:
	An issue or two of a journal devoted to your proof is useful.

proof by omission:
	'The reader may easily supply the details'
	'The other 253 cases are analogous'
	'...' 

proof by obfuscation:
	A long plotless sequence of true and/or meaningless 
	syntactically related statements.

proof by wishful citation:
	The author cites the negation, converse, or generalization of 
	a theorem from the literature to support his claims.

proof by funding:
	How could three different government agencies be wrong?

proof by eminent authority:
	'I saw Karp in the elevator and he said it was probably NP-
	complete.' 

proof by personal communication:
	'Eight-dimensional colored cycle stripping is NP-complete 
	[Karp, personal communication].' 

proof by reduction to the wrong problem:
	'To see that infinite-dimensional colored cycle stripping is 
	decidable, we reduce it to the halting problem.' 

proof by reference to inaccessible literature:
	The author cites a simple corollary of a theorem to be found 
	in a privately circulated memoir of the Slovenian 
	Philological Society, 1883.

proof by importance:
	A large body of useful consequences all follow from the 
	proposition in question.

proof by accumulated evidence:
	Long and diligent search has not revealed a counterexample.

proof by cosmology:
	The negation of the proposition is unimaginable or 
	meaningless. Popular for proofs of the existence of God.

proof by mutual reference:
	In reference A, Theorem 5 is said to follow from Theorem 3 in 
	reference B, which is shown to follow from Corollary 6.2 in 
	reference C, which is an easy consequence of Theorem 5 in 
	reference A.

proof by metaproof:
	A method is given to construct the desired proof. The 
	correctness of the method is proved by any of these 
	techniques.

proof by picture:
	A more convincing form of proof by example. Combines well 
	with proof by omission.

proof by vehement assertion:
	It is useful to have some kind of authority relation to the 
	audience.

proof by ghost reference:
	Nothing even remotely resembling the cited theorem appears in 
	the reference given.

proof by forward reference:
	Reference is usually to a forthcoming paper of the author, 
	which is often not as forthcoming as at first.

proof by semantic shift:
	Some of the standard but inconvenient definitions are changed 
	for the statement of the result.

proof by appeal to intuition:
	Cloud-shaped drawings frequently help here.



More information about the Comp.unix.wizards mailing list