In this blog I blab a bit about vulnerabilities in software. There is no definite conclusion to be had here. Should you chose to read it, don’t blame me for wasting your time. You have been warned. Feasible Security In our quest to make secure systems, the implied assumption often seems to be that we should strive for making complex software machinery that has a defined output for all possible kinds of input. That is, we can be “sure” it does the “right” thing.