[160] in WWW Security List Archive
Re: what are realistic threats?
daemon@ATHENA.MIT.EDU (Christian L. Mogensen)
Thu Sep 29 23:13:32 1994
From: "Christian L. Mogensen" <mogens@cs.stanford.edu>
To: masinter@parc.xerox.com
Date: Thu, 29 Sep 1994 13:58:01 -0700 (PDT)
Cc: hallam@dxal18.cern.ch, www-security@ns1.rutgers.edu
In-Reply-To: <94Sep29.094804pdt.2760@golden.parc.xerox.com> from "Larry Masinter" at Sep 29, 94 09:47:55 am
Reply-To: "Christian L. Mogensen" <mogens@cs.stanford.edu>
Larry Masinter writes:
> I expect every piece of freeware I get to come with an explicit
> disclaimer that the software comes AS IS and that there are no
> warrantees against bugs or misfeatures and no liability on the part of
> the producer, etc. I'm not sure what the signature of the producer
> buys me.
That the copy you have matches the one that the author created.
Since there is little reason to suspect the NCSA of writing
trojan horses, I would tend to trust a Mosaic distribution signed by
the NCSA. A distribution without the signature would be more suspect...
Christian "Key distribution is still a problem"