<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<p>From the description<a moz-do-not-send="true"
href="https://www.zdnet.com/article/ripple20-vulnerabilities-will-haunt-the-iot-landscape-for-years-to-come/">
in the linked article</a>, the three most serious
vulnerabilities seem to be buffer overflows. Such errors are
easily avoidable but new vulnerabilities will continue to be built
into products until programmers change the way they write and
verify software. <br>
</p>
<p>Thousands of development teams have incorporated these library
routines in their products and, unsurprisingly, failed to find the
vulnerabilities in their testing. Yet today, thousands of
development teams will continue to resist using better methods,
tools and languages.</p>
<p>As Tony Hoare wrote decades ago: ‘In any respectable branch of
engineering, failure to observe such elementary precautions would
have long been against the law.’</p>
<p>Martyn<br>
</p>
<br>
</body>
</html>