[145632] in cryptography@c2.net mail archive
Re: A mighty fortress is our PKI, Part II
daemon@ATHENA.MIT.EDU (James A. Donald)
Fri Aug 6 15:22:04 2010
Date: Sat, 07 Aug 2010 04:57:44 +1000
From: "James A. Donald" <jamesd@echeque.com>
Reply-To: jamesd@echeque.com
CC: cryptography@metzdowd.com
In-Reply-To: <4C5A142A.1090607@jacaranda.org>
On 2010-08-05 11:30 AM, David-Sarah Hopwood wrote:
> Signatures are largely a distraction from the real problem: that software
> is (unnecessarily) run with the full privileges of the invoking user.
> By all means authenticate software, but that's not going to prevent
malware.
A lot of devices are locked down so that you cannot install bad
software. This is somewhat successful in preventing bad software from
being installed, and highly successful in irritating users.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com