[145632] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: A mighty fortress is our PKI, Part II

daemon@ATHENA.MIT.EDU (James A. Donald)
Fri Aug 6 15:22:04 2010

Date: Sat, 07 Aug 2010 04:57:44 +1000
From: "James A. Donald" <jamesd@echeque.com>
Reply-To: jamesd@echeque.com
CC: cryptography@metzdowd.com
In-Reply-To: <4C5A142A.1090607@jacaranda.org>

On 2010-08-05 11:30 AM, David-Sarah Hopwood wrote:
 > Signatures are largely a distraction from the real problem: that software
 > is (unnecessarily) run with the full privileges of the invoking user.
 > By all means authenticate software, but that's not going to prevent 
malware.

A lot of devices are locked down so that you cannot install bad 
software.  This is somewhat successful in preventing bad software from 
being installed, and highly successful in irritating users.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post