[14107] in cryptography@c2.net mail archive
Re: fyi: bear/enforcer open-source TCPA project
daemon@ATHENA.MIT.EDU (bear)
Mon Sep 8 23:08:41 2003
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 8 Sep 2003 16:54:32 -0700 (PDT)
From: bear <bear@sonic.net>
To: Sean Smith <sws@cs.dartmouth.edu>
Cc: cryptography@metzdowd.com
In-Reply-To: <200309082155.h88LtZ2J010904@chipotle.cs.dartmouth.edu>
On Mon, 8 Sep 2003, Sean Smith wrote:
>How can you verify that a remote computer is the "real thing, doing
>the right thing?"
You cannot.
>In contrast, this code is part of our ongoing effort to use open
>source and TCPA to turn ordinary computers into "virtual" secure
>coprocessors---more powerful but less secure than their high-assurance
>cousins.
The correct security approach is to never give a remote machine
any data that you don't want an untrusted machine to have. Anything
short of that *will* be cracked.
Bear
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com